ForceAdmin – Create Infinite UAC Prompts Forcing A User To Run As Admin
ForceAdmin is a c# payload builder, creating infinate UAC pop-ups until the user allows the program to be ran. The...
ForceAdmin is a c# payload builder, creating infinate UAC pop-ups until the user allows the program to be ran. The...
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods. FeaturesAutomatically detects...
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Changed from sam-the-admin. Usage SAM THE ADMIN CVE-2021-42278 +...
BeatRev Version 2Disclaimer/LiabilityThe work that follows is a POC to enable malware to "key" itself to a particular victim in...
A python script to scan for Apache Tomcat server vulnerabilities. FeaturesMultithreaded workers to search for Apache tomcat servers.Multiple target source...
Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound...
A tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $ chmod +x...
A curated list of awesome tools, research, papers and other projects related to password cracking and password security. Read the...
Masky is a Masky also provides options that are commonly provided by such tools (thread number, authentication mode, targets loaded...
Erlik - Informaion Disclosure Code: Code: Command Injection Code: Brute Force Code: Deserialization Code: Download Vulnerable-Soap-Service If you like the...
toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of...
Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way....
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to...
With dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of...
Deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate...
System Informer A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to...
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of...
Hunt & Hackett presents a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution...
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures...
completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks. crAPI is vulnerable by...
ropr is a blazing fast multithreaded ROP Gadget finder What is a ROP Gadget? ROP (Return Oriented Programming) Gadgets are...
hoaxshell is an unconventional Windows reverse shell, currently Find more screenshots here. Installation git clone https://github.com/t3l3machus/hoaxshellcd ./hoaxshellsudo pip3 install -r...
VLAN attacks toolkit DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of...
0x00 Introduction Tool introduction RedGuard is a derivative work of the C2 facility pre-flow control technology. It has a lighter...