Mhf - Mobile Helper Framework - A Tool That Automates The Process Of...
Mobile Helper Framework is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or...
View ArticleSharpCovertTube - Youtube As Covert-Channel - Control Windows Systems...
SharpCovertTube is a program created to control Windows systems remotely by uploading videos to Youtube.The program monitors a Youtube channel until a video is uploaded, decodes the QR code from the...
View ArticleWinFiHack - A Windows Wifi Brute Forcing Utility Which Is An Extremely Old...
WinFiHack is a recreational attempt by me to rewrite my previous project Brute-Hacking-Framework's main wifi hacking script that uses netsh and native Windowsscripts to create a wifi bruteforcer. This...
View ArticleNomore403 - Tool To Bypass 403/40X Response Codes
nomore403 is an innovative tool designed to help cybersecurity professionals and enthusiasts bypass HTTP 40X errors encountered during web security assessments. Unlike other solutions, nomore403...
View ArticleSSH-Private-Key-Looting-Wordlists - A Collection Of Wordlists To Aid In...
SSH Private Key Looting Wordlists. A Collection Of Wordlists To Aid In Locating Or Brute-Forcing SSH Private Key File Names.LFI for Lateral Movement? Gain SSH...
View ArticleSome-Tweak-To-Hide-Jwt-Payload-Values - A Handful Of Tweaks And Ideas To...
some-tweak-to-hide-jwt-payload-valuesa handful of tweaks and ideas to safeguard the JWT payload, making it futile to attempt decoding by constantly altering its value, ensuring the decoded output...
View Articlen0Mac - Yet Another Mac Changer!!!
This script changes the MAC address of the network interface to a randomly generated address on system startup using crontab. It then uses the macchanger command to generate a list of MAC address...
View ArticleGtfocli - GTFO Command Line Interface For Easy Binaries Search Commands That...
GTFOcli it's a Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured systems.InstallationUsing go:go install...
View ArticleDarkGPT - An OSINT Assistant Based On GPT-4-200K Designed To Perform Queries...
DarkGPT is an artificial intelligence assistant based on GPT-4-200K designed to perform queries on leaked databases. This guide will help you set up and run the project on your local...
View ArticleGoogle-Dorks-Bug-Bounty - A List Of Google Dorks For Bug Bounty, Web...
A list of Google Dorks for Bug Bounty, Web Application Security, and PentestingLive ToolBroad domain search w/ negative searchsite:example.com -www -shop -share -ir -mfaPHP extension w/...
View ArticlePyradm - Python Remote Administration Tool Via Telegram
Remote administration crossplatfrom tool via telegram\ Coded with ❤️ python3 + aiogram3\ https://t.me/pt_softv0.3[X] Screenshot from target[X] Crossplatform[X] Upload/Download[X] Fully compatible...
View ArticleDorkish - Chrome Extension Tool For OSINT & Recon
During reconaissance phase or when doing OSINT , we often use google dorking and shodan and thus the idea of Dorkish. Dorkish is a Chrome extension tool that facilitates custom dork creation for Google...
View ArticlemapXplore - Allow Exporting The Information Downloaded With Sqlmap To A...
mapXplore is a modular application that imports data extracted of the sqlmap to PostgreSQL or SQLite database.Its main features are:Import of information extracted from sqlmap to PostgreSQL or SQLite...
View ArticleShodan Dorks
Shodan Dorks by twitter.com/lothos612Feel free to make suggestionsShodan DorksBasic Shodan Filterscity:Find devices in a particular city. city:"Bangalore"country:Find devices in a particular country....
View ArticleGAP-Burp-Extension - Burp Extension To Find Potential Endpoints, Parameters,...
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters...
View ArticleMultiDump - Post-Exploitation Tool For Dumping And Extracting LSASS Memory...
MultiDump is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly, without triggering Defender alerts, with a handler written in Python.Blog post:...
View ArticleDNS-Tunnel-Keylogger - Keylogging Server And Client That Uses DNS...
This post-exploitation keylogger will covertly exfiltrate keystrokes to a server. These tools excel at lightweight exfiltration and persistence, properties which will prevent detection. It uses DNS...
View ArticleSkytrack - Planespotting And Aircraft OSINT Tool Made Using Python
Aboutskytrack is a command-line based plane spotting and aircraft OSINT reconnaissance tool made using Python. It can gather aircraft information using various data sources, generate a PDF report for a...
View ArticleSr2T - Converts Scanning Reports To A Tabular Format
Scanning reports to tabular (sr2t)This tool takes a scanning tool's output file, and converts it to a tabular format (CSV, XLSX, or text table). This tool can process output from the following...
View ArticlePentest-Muse-Cli - AI Assistant Tailored For Cybersecurity Professionals
Pentest Muse is an AI assistant tailored for cybersecurity professionals. It can help penetration testers brainstorm ideas, write payloads, analyze code, and perform reconnaissance. It can also take...
View Article