Osx-Password-Dumper - A Tool To Dump Users'S .Plist On A Mac OS System And To...
OSX Password Dumper ScriptOverviewA bash script to retrieve user's .plist files on a macOS system and to convert the data inside it to a crackable hash format. (to use with John The Ripper or...
View ArticleAPIDetector - Efficiently Scan For Exposed Swagger Endpoints Across Web...
APIDetector is a powerful and efficient tool designed for testing exposed Swagger endpoints in various subdomains with unique smart capabilities to detect false-positives. It's particularly useful for...
View ArticleTelegram-Nearby-Map - Discover The Location Of Nearby Telegram Users
Telegram Nearby Map uses OpenStreetMap and the official Telegramlibrary to find the position of nearby users.Please note: Telegram's API was updated a while ago to make nearby user distances less...
View ArticlePacketSpy - Powerful Network Packet Sniffing Tool Designed To Capture And...
PacketSpy is a powerful network packet sniffing tool designed to capture and analyze network traffic. It provides a comprehensive set of features for inspecting HTTP requests and responses, viewing raw...
View ArticleNim-Shell - Reverse Shell That Can Bypass Windows Defender Detection
Reverse shell that can bypass windows defender detection$ apt install nimCompilationnim c -d:mingw --app:gui nimshell.nimChange the IP address and port number you want to listen to in the nimshell.nim...
View ArticleNetworkSherlock - Powerful And Flexible Port Scanning Tool With Shodan
NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities, NetworkSherlock can efficiently scan...
View ArticleMacMaster - MAC Address Changer
MacMaster is a versatile command line tool designed to change the MAC address of network interfaces on your system. It provides a simple yet powerful solution for network anonymity and...
View ArticlePySQLRecon - Offensive MSSQL Toolkit Written In Python, Based Off SQLRecon
PySQLRecon is a Python port of the awesome SQLRecon project by @sanjivkawa. See the commands section for a list of capabilities.InstallPySQLRecon can be installed with pip3 install pysqlrecon or by...
View ArticlePipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
A GUI tool for viewing Windows Named Pipes and searching for insecure permissions. The tool was published as part of a research about Docker named pipes:"Breaking Docker Named Pipes SYSTEMatically:...
View ArticleLinpmem - A Physical Memory Acquisition Tool For Linux
Like its Windows counterpart, Winpmem, this is not a traditional memory dumper. Linpmem offers an API for reading from any physical address, including reserved memory and memory holes, but it can also...
View ArticleProcessStomping - A Variation Of ProcessOverwriting To Execute Shellcode On...
A variation of ProcessOverwriting to execute shellcode on an executable's sectionWhat is itFor a more detailed explanation you can read my blog postProcess Stomping, is a variation of hasherezade’s...
View ArticleCLZero - A Project For Fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors
A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors.AboutThank you to @albinowax, @defparam and @d3d else this tool would not exist. Inspired by the tool Smuggler all attack gadgets...
View ArticleKnowsMore - A Swiss Army Knife Tool For Pentesting Microsoft Active Directory...
KnowsMore officially supports Python 3.8+.Main featuresImport NTLM Hashes from .ntds output txt file (generated by CrackMapExec or secretsdump.py)Import NTLM Hashes from NTDS.dit and SYSTEMImport...
View ArticleMetahub - An Automated Contextual Security Findings Enrichment And Impact...
MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS Security Hub or any ASFF-compatible security scanner....
View ArticleBlutter - Flutter Mobile Application Reverse Engineering Tool
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT RuntimeCurrently the application supports only Android libapp.so (arm64 only). Also the application is currently work only...
View ArticleBestEdrOfTheMarket - Little AV/EDR Bypassing Lab For Training And Learning...
Little AV/EDR Evasion Lab for training & learning purposes. (️ under construction..) ____ _ _____ ____ ____ ___ __ _____ _| __ ) ___ ___| |_ | ____| _ \| _ \ / _ \ / _| |_ _| |__ ___| _ \ / _ \/...
View ArticleLegba - A Multiprotocol Credentials Bruteforcer / Password Sprayer And...
Legba is a multiprotocol credentialsbruteforcer / password sprayer and enumerator built with Rust and the Tokio asynchronous runtime in order to achieve better performances and stability while...
View ArticleVED-eBPF - Kernel Exploit And Rootkit Detection Using eBPF
VED (Vault Exploit Defense)-eBPF leverages eBPF (extended Berkeley Packet Filter) to implement runtime kernel security monitoring and exploit detection for Linux systems.IntroductioneBPF is an...
View ArticleTop 20 Most Popular Hacking Tools in 2023
As last year, this year we made a ranking with the most popular tools between January and December 2023.The tools of this year encompass a diverse range of cybersecurity disciplines, including...
View ArticlePantheon - Insecure Camera Parser
Pantheon is a GUI application that allows users to display information regarding network cameras in various countries as well as an integrated live-feed for non-protected...
View Article