HTTP Bridge - Send TCP Stream Packets Over Simple HTTP Request
I've wrote this program as a proof of concept to test the idea of be able to send tcp stream packets over simple http request like PUT, PATCH, POST, GET, without use a proxy way like CONNECT method....
View ArticleGirsh - Automatically Spawn A Reverse Shell Fully Interactive
Who didn't get bored of manually typing the few lines to upgrade a reverse shell to a full interactive reverse shell (tty spawn, stty size ..., stty raw -echo) or typing the command to use...
View ArticlePowerSharpPack - Many usefull offensive CSharp Projects wraped into...
Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead because of AMSI, Script-block-logging, Constrained Language...
View ArticleDLLHSC - DLL Hijack SCanner A Tool To Assist With The Discovery Of Suitable...
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents of this repositoryThis repository hosts the Visual Studio project file for...
View ArticleConfused - Tool To Check For Dependency Confusion Vulnerabilities In Multiple...
A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt, JavaScript (npm) package.json, PHP (composer)...
View ArticleGenisys - Powerful Telegram Members Scraping And Adding Toolkit
Powerful Telegram Members Scraping and Adding Toolkit FeaturesADDS IN BULK[by user id, not by username]Scrapes and adds to public groupsWorks in Windows systemsYou can run unlimited accounts at the...
View ArticleSnitchDNS - Database Driven DNS Server With A Web UI
SnitchDNS is a database driven DNS Server with a Web UI, written in Python and Twisted, that makes DNS administration easier with all configuration changed applied instantly without restarting any...
View ArticleLazy-RDP - Script For AutomRDPatic Scanning And Brute-Force
Script For AutomRDPatic Scanning And Brute-Force.Demo Video:Lazy-RDP over SSH:Script for automatic scanning of the address list for the presence of open 3389 ports, and then selecting the method and...
View ArticleTurbo-Intruder - A Burp Suite Extension For Sending Large Numbers Of HTTP...
Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. It's intended to complement Burp Intruder by handling attacks that require exceptional...
View ArticleStrafer - A Tool To Detect Potential Infections In Elasticsearch Instances
Elasticsearch infections are rising exponentially. The adversaries are exploiting open and exposed Elasticsearch interfaces to trigger infections in the cloud and non-cloud deployments. During this...
View ArticleAnonX - An Encrypted File Transfer Via AES-256-CBC
An Encrypted File transfer via AES-256-CBCAnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one week and shall remove from the server. AnonX encrypts the directory...
View ArticleRafel-Rat - Android Rat Written In Java With WebPanel For Controlling Victims
Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features.Main FeaturesAdmin PermissionAdd App To White ListLooks Like BrowserRuns In Background Even App is...
View ArticleOffensivePipeline - Tool To Download, Compile (Without Visual Studio) And...
OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.OffensivePipeline downloads the tool from the git repository, then compiles it with...
View ArticleReverse-Shell-Generator - Hosted Reverse Shell Generator With A Ton Of...
Hosted Reverse Shell generator with a ton of functionality -- (great for CTFs) Hosted Instancehttps://revshells.comFeaturesGenerate common listeners and reverse shellsAutomatically copy to...
View ArticleInvoke-SocksProxy - Socks Proxy, And Reverse Socks Server Using Powershell
Creates a local or "reverse" Socks proxy using powershell.The local proxy is a simple Socks 4/5 proxy.The reverse proxy creates a tcp tunnel by initiating outbond SSL connections that can go through...
View ArticleMole - A Framework For Identifying And Exploiting Out-Of-Band Application...
A framework for identifying and exploiting out-of-band (OOB) vulnerabilities.Installation & SetupMole InstallPython >= 3.6virtualenv -p /usr/bin/python3 venvsource...
View ArticleSubcert - An Subdomain Enumeration Tool, That Finds All The Subdomains From...
Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs.SetupStep 1: Install Python 3apt-get install python3-pipStep 2: Clone the Repositorygit...
View ArticleVajra - A Highly Customi zable Target And Scope Based Automated Web Hacking...
An automated web hacking framework for web applicationsDetailed insight about Vajra can be found athttps://hackwithproxy.medium.com/introducing-vajra-an-advanced-web-hacking-framework-bd8307a01aa8...
View ArticleNetmap.Js - Fast Browser-Based Network Discovery Module
Fast browser-based network discovery moduleDescriptionnetmap.js provides browser-based host discovery and port scanning capabilities to allow you to map website visitors' networks.It's quite fast,...
View ArticleProxyLogon - PoC Exploit for Microsoft Exchange
PoC Exploit for Microsoft Exchange LauncheOriginal PoC: https://github.com/testanullHow to use:python proxylogon.py <name or IP of server> <user@fqdn>Example:python proxylogon.py primary...
View Article