Nginxpwner - Tool to look for common Nginx misconfigurations and vulnerabilities
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.Install:cd /optgit clone https://github.com/stark0de/nginxpwnercd nginxpwnerchmod +x...
View ArticleStorm-Breaker - Tool Social Engineering (Access Webcam, Microphone, OS...
Tool Social Engineering (Access Webcam, Microphone, OS Password Grabber And Location Finder) With NgrokFeatures:Get Device Information Without Any PermissionsAccess Location [SMARTPHONES]Os Password...
View ArticleWinPmem - The Multi-Platform Memory Acquisition Tool
The WinPmem memory acquisition driver and userspaceWinPmem has been the default open source memory acquisition driver for windows for a long time. It used to live in the Rekall project, but has...
View ArticleDuplicut - Remove Duplicates From MASSIVE Wordlist, Without Sorting It (For...
Quickly dedupe massive wordlists, without changing the order Created by nil0x42 and contributorsOverviewModern password wordlist creation usually implies concatenating multiple data sources.Ideally,...
View ArticleEvasor - A Tool To Be Used In Post Exploitation Phase For Blue And Red Teams...
The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be used to bypass any Application Control rules. It is very easy to use,...
View ArticleLibAFL - Advanced Fuzzing Library - Slot Your Fuzzer Together In Rust! Scales...
Advanced Fuzzing Library - Slot your own fuzzers together and extend their features using Rust.LibAFL is written and maintained by Andrea Fioraldi andreafioraldi@gmail.com and Dominik Maier...
View ArticlePystinger - Bypass Firewall For Traffic Forwarding Using Webshell
Pystinger implements SOCK4 proxy and port mapping through webshell.It can be directly used by metasploit-framework, viper, cobalt strike for session online.Pystinger is developed in python, and...
View ArticleBotkube - An App That Helps You Monitor Your Kubernetes Cluster, Debug...
For complete documentation visit www.botkube.ioBotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug critical deployments and gives...
View ArticleKubeArmor - Container-aware Runtime Security Enforcement System
Introduction to KubeArmorKubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access, networking operation, and resource...
View ArticlePriv2Admin - Exploitation Paths Allowing You To (Mis)Use The Windows...
The idea is to "translate" Windows OS privileges to a path leading to:administrator,integrity and/or confidentiality threat,availability threat,just a mess.Privileges are listed and explained at:...
View ArticleJudge-Jury-and-Executable - A File System Forensics Analysis Scanner And...
Features:Scan a mounted filesystem for threats right awayOr gather a system baseline before an incident, for extra threat hunting abilityCan be used before, during or after an incidentFor one to many...
View ArticleCANalyse - A Vehicle Network Analysis And Attack Tool
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect to simple user interfaces such as Telegram. Basically, while using this tool the attacker...
View ArticleWordPress-Brute-Force - Super Fast Login WordPress Brute Force
WordPress Brute Force Super Fast Login .---. .----------- / \ __ / ------ / / \( )/ ----- ////// ' \/ ` --- //// / // : ★★ : --- // / / /` '--// //..\ WpCrack Brute Froce Tool™...
View ArticleRed-Detector - Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/).Audit your EC2 instance to find security misconfigurations using Lynis (https://cisofy.com/solutions/#lynis).Scan...
View ArticleKiterunner - Contextual Content Discovery Tool
For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective for legacy web servers that host static files or respond with 3xx’s upon a...
View ArticleWaybackurls - Fetch All The URLs That The Wayback Machine Knows About For A...
Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout.Usage example:▶ cat domains.txt | waybackurls> urlsInstall:▶ go get...
View ArticleLucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such...
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security...
View ArticleCyberBattleSim - An Experimentation And Research Platform To Investigate The...
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network environment. The simulation provides a...
View ArticleDNSObserver - A Handy DNS Service Written In Go To Aid In The Detection Of...
A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends notifications with the...
View ArticleBaserunner - A Tool For Exploring Firebase Datastores
A tool for exploring and exploitingFirebase datastores.Set upgit clone https://github.com/iosiro/baserunner.gitcd baserunnernpm installnpm run buildnpm startGo to http://localhost:3000 in your...
View Article