Iac-Scan-Runner - Service That Scans Your Infrastructure As Code For Common...
Service that scans your Infrastructure as Code for common vulnerabilities.AspectInformationTool nameIaC Scan RunnerDocker imagexscanner/runnerPyPI packageiac-scan-runnerDocumentationdocsContact...
View ArticleOSINT-Framework - OSINT Framework
OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer...
View ArticleMass-Bruter - Mass Bruteforce Network Protocols
Mass bruteforce network protocolsInfoSimple personal script to quickly mass bruteforce common services in a large scale of network. It will check for default credentials on ftp, ssh, mysql,...
View ArticleMaccaroniC2 - A PoC Command And Control Framework That Utilizes The Powerful...
MaccaroniC2 is a proof-of-conceptCommand and Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client and server implementation of the SSHv2 protocol...
View ArticleDynastyPersist - A Linux Persistence Tool!
A Linux persistence tool!A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This script provides a collection of features that demonstrate...
View ArticleHiddenDesktop - HVNC For Cobalt Strike
Hidden Desktop (often referred to as HVNC) is a tool that allows operators to interact with a remote desktop session without the user knowing. The VNC protocol is not involved, but the result is a...
View ArticleWindiff - Web-based Tool That Allows Comparing Symbol, Type And Syscall...
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of MicrosoftWindows binaries across different versions of the operating system. The...
View ArticleAladdin - Payload Generation Technique That Allows The Deseriallization Of A...
Aladdin is a payload generation technique based on the work of James Forshaw (@tiraniddo) that allows the deseriallization of a .NET payload and execution in memory. The original vector was documented...
View ArticleT3SF - Technical Tabletop Exercises Simulation Framework
T3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events list (MSEL) together with a set of rules defined for each exercise (optional) and a...
View ArticleNimExec - Fileless Command Execution For Lateral Movement In Nim
Basically, NimExec is a filelessremote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes the binary path of a random or given service run by LocalSystem...
View ArticleC2-Search-Netlas - Search For C2 Servers Based On Netlas
C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It provides a straightforward and user-friendly CLI interface for searching C2 servers,...
View ArticlePorch-Pirate - The Most Comprehensive Postman Recon / OSINT Client And...
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose reconaissance / OSINT framework for Postman. While existing tools are great proof...
View ArticlePassBreaker - Command-line Password Cracking Tool Developed In Python
PassBreaker is a command-line password cracking tool developed in Python. It allows you to perform various password cracking techniques such as wordlist-based attacks and brute force attacks....
View ArticleKali Linux 2023.4 - Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2023.4. This release has various impressive updates.The summary of the changelog since the 2023.3 release from August is:Cloud ARM64 - Now...
View ArticleBlueBunny - BLE Based C2 For Hak5's Bash Bunny
C2 solution that communicates directly over Bluetooth-Low-Energy with your Bash Bunny Mark II.Send your Bash Bunny all the instructions it needs just over the air.OverviewStructureInstallation &...
View ArticleCloakQuest3r - Uncover The True IP Address Of Websites Safeguarded By Cloudflare
CloakQuest3r is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely adopted web security and performance enhancement service. Its...
View ArticleAcuAutomate - Unofficial Acunetix CLI Tool For Automated Pentesting And Bug...
AcuAutomate is an unofficial Acunetix CLI tool that simplifies automatedpentesting and bug hunting across extensive targets. It's a valuable aid during large-scale pentests, enabling the easy launch or...
View ArticlePy-Amsi - Scan Strings Or Files For Malware Using The Windows Antimalware...
py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI is an interface native to Windows that allows applications to ask the...
View ArticleDouglas-042 - Powershell Script To Help Speed Up Threat Hunting Incident...
DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the meticulous collection of crucial evidence derived from both...
View ArticleNetProbe - Network Probe
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device...
View Article