Nexfil - OSINT Tool For Finding Profiles By Username
NExfil is an OSINT tool written in python for finding profiles by username. The provided usernames are checked on over 350 websites within few seconds. The goal behind this tool was to get results...
View ArticleJWTweak - Detects The Algorithm Of Input JWT Token And Provide Options To...
With the global increase in JSON Web Token (JWT) usage, the attack surface has also increased significantly. Having said that, this utility is designed with the aim to generate the new JWT token with...
View ArticleRemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From...
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin.Briefly:It...
View ArticleSx - Fast, Modern, Easy-To-Use Network Scanner
sx is the command-line network scanner designed to follow the UNIX philosophy.The goal of this project is to create the fastest network scanner with clean and simple code.Features30x times faster than...
View ArticleDcRat - A Simple Remote Tool Written In C#
DcRat is a simple remote tool written in C#IntroductionFeaturesTCP connection with certificate verification, stable and securityServer IP port can be archived through linkMulti-Server,multi-port...
View ArticleDNSrr - A Tool Written In Bash, Used To Enumerate All The Juicy Stuff From DNS
DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS records, it uses different techniques likeDNS Forward BruteforceDNS Reverse BruteforceDNS Cache SnoopingDNS Zone...
View ArticleWhisker - A C# Tool For Taking Over Active Directory User And Computer...
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target...
View ArticleInjector - Complete Arsenal Of Memory Injection And Other Techniques For...
Complete Arsenal of Memory injection and other techniques for red-teaming in WindowsWhat does Injector do?Process injection support for shellcode located at remote server as well as local storage. Just...
View ArticleWpscvn - Wpscvn Is A Tool For Pentesters, Website Owner To Test If Their...
wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themesThe author does not hold any responsibility for the bad use of this tool, remember that...
View ArticleRedteam-Hardware-Toolkit - Red Team Hardware Toolkit
A collection of hardware s that aid in red team operations. This repository will help you during red team engagement. If you want to contribute to this list send me a pull request.A Red Team should be...
View ArticleVentoy - A New Bootable USB Solution
Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to format the disk over and over, you just need to copy the image files to the...
View ArticleExploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across...
The goal is to list exploitation mitigations added over time in various operating systems, software, libraries or hardware. It becomes handy to know if a given vulnerability is easily exploitable or...
View ArticleKali-Whoami - A Privacy Tool Developed To Keep You Anonymous On Kali Linux At...
The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest...
View ArticleBughound - Static Code Analysis Tool Based On Elasticsearch
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana to get useful insights about the potential vulnerabilities in your...
View ArticleCilium - eBPF-based Networking, Security, And Observability
Cilium is open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application containers or processes. Cilium operates...
View ArticleDNSStager - Hide Your Payload In DNS
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.DNSStager will create a malicious DNS server that handles DNS requests to your domain and return...
View ArticleARTIF - An Advanced Real Time Threat Intelligence Framework To Identify...
ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of MISP to identify threats and malicious web traffic on the basis of IP reputation...
View ArticleOrbitaldump - A Simple Multi-Threaded Distributed SSH Brute-Forcing Tool...
A simple multi-threaded distributed SSH brute-forcing tool written in Python.How it WorksWhen the script is executed without the --proxies switch, it acts just like any other multi-threaded SSH...
View ArticleMANSPIDER - Spider Entire Networks For Juicy Files Sitting On SMB Shares....
Crawl SMB shares for juicy information. File content searching + regex is supported!File types supported:PDFDOCXXLSXPPTXany text-based formatand many more!!MAN-SPIDER will crawl every share on every...
View ArticleRegexploit - Find Regular Expressions Which Are Vulnerable To ReDoS (Regular...
Find regexes which are vulnerable to Regular ExpressionDenial of Service (ReDoS).More info on the Doyensec blogMany default regular expression parsers have unbounded worst-case complexity. Regex...
View Article