Galer - A Fast Tool To Fetch URLs From HTML Attributes By Crawl-In
A fast tool to fetch URLs from HTML attributes by crawl-in. Inspired by the @omespino Tweet, which is possible to extract src, href, url and action values by evaluating JavaScript through Chrome...
View ArticleSSRFuzz - A Tool To Find Server Side Request Forgery Vulnerabilities, With...
SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities, with CRLF chaining capabilitiesWhy?I wanted to write a tool in Golang for concurrencyI wanted to fuzz parameters for SSRF...
View ArticleDirDar - A Tool That Searches For (403-Forbidden) Directories To Break It And...
bypass forbidden directories - find and identify dir listing - you can use it as directory brute-forcer as wellCompatabilyThis tool is compatible with all kind of operating systems as long as you have...
View ArticleSSB - A Faster And Simpler Way To Bruteforce SSH Server
SecureShellBruteforcer— A faster & simpler way to bruteforce SSH server.Installationfrom BinaryDownload a pre-built binary from releases page, unpack and run! Or:▶ (sudo) curl -sSfL...
View ArticlePE-Packer - A Simple Windows X86 PE File Packer Written In C And Microsoft...
PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of reverse engineering.It will do the following things when packing a PE file:Transforming the...
View ArticlePerfusion - Exploit For The RpcEptMapper Registry Key Permissions...
On Windows 7, Windows Server 2008R2, Windows 8, and Windows Server 2012, the registry key of the RpcEptMapper and DnsCache (7/2008R2 only) services is configured with weak permissions. Any local user...
View ArticleHorusec - An Open Source Tool That Improves Identification Of Vulnerabilities...
Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages for analysis are: C#, Java, Kotlin, Python, Ruby,...
View ArticleRemote-Method-Guesser - Tool For Java RMI Enumeration And Bruteforce Of...
remote-method-guesser (rmg) is a command line utility written in Java and can be used to identify security vulnerabilities on Java RMI endpoints. Currently, the following operations are supported:List...
View ArticleRAT-el - An Open Source Penetration Test Tool That Allows You To Take Control...
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands...
View ArticleHaE - BurpSuite Highlighter And Extractor
HaE is used to highlight HTTP requests and extract information from HTTP response messages or request messages.Read Chinese simplified version (README_zh).Public RulesWebsite:...
View ArticleBugBountyScanner - A Bash Script And Docker Image For Bug Bounty Reconnaissance
A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information output.Helpful? BugBountyScanner helped you net a bounty?DescriptionNote:...
View ArticleBlackMamba - C2/post-exploitation Framework
BlackMamba is a multi client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework.Some of BlackMamba features are:Multi Client - Supports multiple client...
View ArticleKali Linux 2021.1 - Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates. The summary of the changelog since the 2020.4 release from November 2020 is:Xfce 4.16 - Our...
View ArticleAPT-Hunter - Threat Hunting Tool For Windows Event Logs Which Made By Purple...
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover...
View ArticleScareCrow - Payload Creation Framework Designed Around EDR Bypass
If you want to learn more about the techniques utlized in this framework please take a look at Part 1 and Part 2DescriptionScareCrow is a payload creation framework for generating loaders for the use...
View ArticleOpenWifiPass - An Open Source Implementation Of Apple's Wi-Fi Password...
An open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol.DisclaimerOpenWifiPass is experimental software and is the result of reverse engineering efforts by the Open...
View ArticleCornerShot - Amplify Network Visibility From Multiple POV Of Other Hosts
In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and possibly take a shot), without risking exposure. Similarly, the CornerShot package allows one to look at a remote...
View ArticleGatekeeper - First Open-Source DDoS Protection System
Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it can withstand DoS attacks both of today and of tomorrow. In spite of the geographically...
View ArticlePillager - Filesystems For Sensitive Information With Go
Pillager is designed to provide a simple means of leveraging Go's strong concurrency model to recursively search directories for sensitive information in files. Pillager does this by standing on the...
View ArticleGargamel - A Forensic Evidence Acquirer
A Forensic Evidence AcquirerCompileAssuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile a release build typecargo build --releaseDebug build can be compiled...
View Article