Pylirt – Python Linux Incident Response Toolkit
With this application, it is aimed to accelerate the incident response processes by collecting information in linux operating systems. Contact...
With this application, it is aimed to accelerate the incident response processes by collecting information in linux operating systems. Contact...
The Klyda project has been created to aid in quick credential based attacks against online web applications. Klyda supports the...
scscanner is tool to read To do List Add multi-processing Add filter status code options Add save to file options...
Neton is a tool for getting information from Internet connected sandboxes. It is composed by an agent and a web...
A script for generating common revshells fast and easy. Especially nice when in need of Youtube video Version 1.4.6 Added...
With this application, it is aimed to accelerate the incident response processes by collecting information in windows operating systems via...
Abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force. Use it while it still...
D4TA-HUNTER is a tool created in order to automate the collection of information about the employees of a company that...
Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products Important: Make Sure your payload file have all the...
A standalone python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in...
KubeEye is an inspection tool for Kubernetes to discover Kubernetes resources (by OPA ), cluster components, cluster nodes (by Node-Problem-Detector)...
Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients....
SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and...
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs,...
pronounced "screen copy"Read in another languageThis application provides display and control of Android devices connected via USB or over TCP/IP....
Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all...
The Sandbox Scryer is an open-source tool for producing threat hunting and intelligence data from public sandbox detonation output The...
Simple port of the popular Oracle Database Attack Tool (ODAT) ( TEST Module tests if the given connection string can...
Download Slicer If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
nuvola (with the lowercase n) is a tool to dump and perform automatic and manual security analysis on AWS environments...
TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous...
Dismember is a command-line toolkit for Linux that can be used to scan the memory of all processes (or particular...
Download Unblob If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Source Code Management Attack Toolkit - SCMKit is a toolkit that can be used to attack SCM systems. SCMKit allows...