FisherMan - CLI Program That Collects Information From Facebook User Profiles...
Search for public profile information on FacebookInstallation# clone the repo$ git clone https://github.com/Godofcoffe/FisherMan# change the working directory to FisherMan$ cd FisherMan# install the...
View ArticlePackageDNA - Tool To Analyze Software Packages Of Different Programming...
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information...
View ArticleBrutus - An Educational Exploitation Framework Shipped On A Modular And...
An educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Brutus: an IntroductionLooking for version 1? See the branches in this...
View ArticleXLMMacroDeobfuscator - Extract And Deobfuscate XLM Macros (A.K.A Excel 4.0...
XLMMacroDeobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code.It...
View ArticleSQLancer - Detecting Logic Bugs In DBMS
SQLancer (Synthesized Query Lancer) is a tool to automatically test Database Management Systems (DBMS) in order to find logic bugs in their implementation. We refer to logic bugs as those bugs that...
View ArticleKeimpx - Check For Valid Credentials Across A Network Over SMB
keimpx is an open source tool, released under the Apache License 2.0.It can be used to quickly check for valid credentials across a network over SMB. Credentials can be:Combination of user / plain-text...
View ArticleProcess-Dump - Windows Tool For Dumping Malware PE Files From Memory Back To...
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in...
View ArticleLazySign - Create Fake Certs For Binaries Using Windows Binaries And The...
Create fake certs for binaries using windows binaries and the power of bat filesOver the years, several cool tools have been released that are capeable of stealing or forging fake signatures for binary...
View ArticleGit-Secret - Go Scripts For Finding An API Key / Some Keywords In Repository
Go scripts for finding an API key / some keywords in repositoryUpdate V1.0.1Removing some checkersAdding example file contains github dorksHow to Installgo get github.com/daffainfo/Git-SecretHow to...
View ArticleDNSMonster - Passive DNS Capture/Monitoring Framework
Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It can accept traffic from a pcap file, a live interface or a...
View ArticlePSPKIAudit - PowerShell toolkit for auditing Active Directory Certificate...
PowerShell toolkit for auditing Active Directory Certificate Services (AD CS).It is built on top of PKISolution's PSPKI toolkit (Microsoft Public License). This repo contains a newer version of PSPKI...
View ArticleSLSA - Supply-chain Levels For Software Artifacts
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels of software security and supply chain integrity.The...
View ArticleDorkify - Perform Google Dork Search
Perform Google Dork search with DorkifyGoogle DorkingGoogle dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google...
View ArticleBeaconEye - Hunts Out CobaltStrike Beacons And Logs Operator Command Output
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each process for C2 activity.How it worksBeaconEye will scan...
View Articleadalanche - Active Directory ACL Visualizer and Explorer
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active Directory ACL Visualizer - who's...
View ArticleCtf-Screenshotter - A CTF Web Challenge About Making Screenshots
A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was created by @LiveOverflow for https://cscg.de/.Watch the video writeup here:...
View ArticlePantagrule - Large Hashcat Rulesets Generated From Real-World Compromised...
gargantuan hashcat rulesets generated from compromised passwordsProject maintenance warning: This project is deemed completed. No pull requests or changes will be made to this project in the future...
View ArticleHuan - Encrypted PE Loader Generator
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It encrypts the PE file to be run with different keys each time and embeds it in a new...
View ArticleMEAT - This Toolkit Aims To Help Forensicators Perform Different Kinds Of...
M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T!From Jack Farley - BlackStone DiscoveryThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices (and...
View Article