SYNwall - A Zero-Configuration (IoT) Firewall
Zero config (IoT) firewall.SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement a transparent and no-config/no-maintenance firewall.BasicsUsually IoT devices are out...
View ArticleDwn - D(Ockerp)Wn - A Docker Pwn Tool Manager
dwn is a "docker-compose for hackers". Using a simple YAML "plan" format similar to docker-compose, image names, versions and volume / port mappings are defined to setup a tool for use.featuresWith dwn...
View ArticleRonin - A Ruby Platform For Vulnerability Research And Exploit Development
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits, Payloads, Scanners, etc, via...
View ArticleTraitor - Automatic Linux Privesc Via Exploitation Of Low-Hanging Fruit E.G....
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities...
View ArticleAdfsbrute - A Script To Test Credentials Against Active Directory Federation...
A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing password spraying or bruteforce attacks.The main idea is...
View ArticleMoveKit - Cobalt Strike Kit For Lateral Movement
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. The aggressor script handles payload...
View ArticleSwissknife - Scriptable VSCode Extension To Generate Or Manipulate Data. Stop...
The developers swissknife. Do conversions and generations right out of vs code. Extendable with user scriptsAvailable in the Visual Studio MarketplaceCurrently available scriptsBase64 decodeBase64...
View ArticleDefeat-Defender - Powerful Batch Script To Dismantle Complete Windows...
Powerfull Batch File To Disable Windows Defender,Firewall,Smartscreen And Execute the payloadUsage :Edit Defeat-Defender.bat on this line...
View ArticlePentestBro - Combines Subdomain Scans, Whois, Port Scanning, Banner Grabbing...
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses subdomain list of SecLists. Uses nmap service probes...
View ArticleIRTriage - Incident Response Triage - Windows Evidence Collection For...
Scripted collection of system information valuable to a Forensic Analyst. IRTriage will automatically "Run As ADMINISTRATOR" in all Windows versions except WinXP.The original source was Triage-ir...
View ArticleAndroid-PIN-Bruteforce - Unlock An Android Phone (Or Device) By Bruteforcing...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN.Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! How it worksIt uses a USB OTG cable to connect...
View ArticleSish - HTTP(S)/WS(S)/TCP Tunnels To Localhost Using Only SSH
An open source serveo/ngrok alternative.DeployBuilds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds are tagged using a commit sha, branch name, tag, latest if...
View ArticleHttpDoom - A Tool For Response-Based Inspection Of Websites Across A Large...
Validate large HTTP-based attack surfaces in a very fast way. Heavily inspired by Aquatone.Why?When I utilize Aquatone to flyover some hosts, I have some performance issues by the screenshot feature,...
View ArticleSpraygen - Password List Generator For Password Spraying
Password list generator for password spraying - prebaked with goodiesVersion 1.4Generates permutations of Months, Seasons, Years, Sports Teams (NFL, NBA, MLB, NHL), Sports Scores, "Password", and even...
View ArticleCypheroth - Automated, Extensible Toolset That Runs Cypher Queries Against...
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.DescriptionThis is a bash script that automates running cypher queries against...
View ArticleModded-Ubuntu - Run Ubuntu GUI On Your Termux With Much Features
Run Ubuntu GUI on your termux with much features.FeaturesFixed Audio OutputLightweight {Requires at least 4GB Storage}Katoolin3 tool for installing kali tools2 Browsers (Chromium & Mozilla...
View ArticleKubiScan - A Tool To Scan Kubernetes Cluster For Risky Permissions
A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. The tool was published as part of the "Securing Kubernetes Clusters...
View ArticleReproxy - Simple Edge Server / Reverse Proxy
Reproxy is a simple edge HTTP(s) server / reverse proxy supporting various providers (docker, static, file). One or more providers supply information about requested server, requested url, destination...
View ArticleBetterXencrypt - A Better Version Of Xencrypt - Xencrypt It Self Is A...
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not FUD anymore and easily get caught by AMSI,i recode the stub and now it FUD...
View ArticleOverlord - Overlord - Red Teaming Infrastructure Automation
Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user has to provide inputs by using the tool’s modules (e.g. C2, Email Server,...
View Article