Erlik – Vulnerable Soap Service
Erlik - Informaion Disclosure Code: Code: Command Injection Code: Brute Force Code: Deserialization Code: Download Vulnerable-Soap-Service If you like the...
Erlik - Informaion Disclosure Code: Code: Command Injection Code: Brute Force Code: Deserialization Code: Download Vulnerable-Soap-Service If you like the...
toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of...
Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way....
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to...
With dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of...
Deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate...
System Informer A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to...
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of...
Hunt & Hackett presents a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution...
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures...
completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks. crAPI is vulnerable by...
ropr is a blazing fast multithreaded ROP Gadget finder What is a ROP Gadget? ROP (Return Oriented Programming) Gadgets are...
hoaxshell is an unconventional Windows reverse shell, currently Find more screenshots here. Installation git clone https://github.com/t3l3machus/hoaxshellcd ./hoaxshellsudo pip3 install -r...
VLAN attacks toolkit DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of...
0x00 Introduction Tool introduction RedGuard is a derivative work of the C2 facility pre-flow control technology. It has a lighter...
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities. Why write...
Get fresh Download NimGetSyscallStub If you like the site, please consider joining the telegram channel or supporting us on Patreon...
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and...
Faraday was built from within the security community, to make vulnerability management easier and enhance our work. What IDEs are...
Time for another Kali Linux release! – Kali Linux 2022.3. This release has various impressive updates.The highlights for Kali’s 2022.3’s...
PyConUS'22 talk and slides. BlackHAT Asia'22 Arsenal presentation PackagingCon'21 talk and slides Academic dissertation on open-source software security and the...
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by...
BlackStone project or "BlackStone Project" is a tool created in order to automate the work of drafting and submitting a...
This set of scripts is designed to collect a variety of data from an endpoint thought to be infected, to...