SecretScanner - Find Secrets And Passwords In Container Images And File Systems
Deepfence SecretScanner can find any potential secrets in container images or file systems.What are Secrets?Secrets are any kind of sensitive or private data which gives authorized users permission to...
View ArticleTuf - A Framework For Securing Software Update Systems
This repository is the reference implementation of The Update Framework (TUF). It is written in Python and intended to conform to version 1.0 of the TUF specification. This implementation is in use in...
View ArticleSharpGPOAbuse - Tool To Take Advantage Of A User'S Edit Rights On A Group...
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by...
View ArticleDefenderCheck - Identifies The Bytes That Microsoft Defender Flags On
Quick tool to help make evasion work a little bit easier.Takes a binary as input and splits it until it pinpoints that exact byte that Microsoft Defender will flag on, and then prints those offending...
View ArticleSharpHound3 - C# Data Collector For The BloodHound Project
Get SharpHoundThe latest build of SharpHound will always be in the BloodHound repository hereCompile InstructionsSharpHound is written using C# 9.0 features. To easily compile this project, use Visual...
View ArticleWatson - Enumerate Missing KBs And Suggest Exploits For Useful Privilege...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.Supported VersionsWindows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909,...
View ArticleMaigret - OSINT Username Checker. Collect A Dossier On A Person By Username...
The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon. His investigation method is based on understanding the personality of different people and their...
View ArticleUAC - Unix-like Artifacts Collector
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. It respects the order of volatility and...
View ArticleScylla - The Simplistic Information Gathering Engine | Find Advanced...
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts, websites/webservers, phone numbers, and names. Scylla also allows users...
View ArticleBurpsuite-Copy-As-XMLHttpRequest - Copy As XMLHttpRequest BurpSuite Extension
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies PoC development when exploiting XSS.Installationdownload the...
View ArticleThreatMapper - Identify Vulnerabilities In Running Containers, Images, Hosts...
The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community edition. This community edition empowers the users with following...
View ArticleColumbo - A Computer Forensic Analysis Tool Used To Simplify And Identify...
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down data to small sections and uses pattern recognition and machine...
View ArticleNtHiM - Super Fast Sub-domain Takeover Detection
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the Releases page. You can download the...
View ArticleMax - Maximizing BloodHound
Maximizing BloodHound.DescriptionNew Release:dpat - The BloodHound Domain Password Audit Tool (DPAT)A simple suite of tools:get-info - Pull lists of information from the Neo4j databasemark-owned - Mark...
View ArticleRedcloud - Automated Red Team Infrastructure Deployement Using Docker
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's speed for your tools. Deploys in minutes. Use and manage it...
View ArticlePoisonApple - macOS Persistence Tool
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters for cyber threat emulation purposes.InstallDo it up:$ pip3 install...
View ArticleSNOWCRASH - A Polyglot Payload Generator
SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded into a single polyglot...
View ArticleGotestwaf - Go Test WAF Is A Tool To Test Your WAF Detection Capabilities...
An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses.How it worksIt is a 3-steps requests generation process that multiply amount of payloads to...
View ArticleAzureC2Relay - An Azure Function That Validates And Relays Cobalt Strike...
AzureC2Relay is an Azure Function that validates and relays Cobalt Strikebeacontraffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile. Any incoming requests that do...
View ArticleCpufetch - Simplistic Yet Fancy CPU Architecture Fetching Tool
Simplistic yet fancy CPU architecture fetching tool1. Supportcpufetch currently supports x86_64 CPUs (both Intel and AMD) and ARM.Platformx86_64ARMNotesLinux✔️✔️Prefered platform. Experimental ARM...
View Article