Peetch – An eBPF Playground
peetch is a collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections. Currently,...
peetch is a collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections. Currently,...
A fast tool to scan SAAS,PAAS App written in Go SAAS App Support : salesforce contentful (next version) Note flag...
Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate...
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc. Created by Nick Swink from Layer 8...
Passive-Recursive DNS daemon. Quickstart nameserver 127.0.0.1 | sudo tee /etc/resolv.conf dig google.com dig -x $(dig +short google.com)">go get github.com/korc/PR-DNSdsudo setcap...
In the age of EDR, red team operators cannot get away with using pre-compiled payloads anymore. As such, malware development...
TerraformGoat is selefra research lab's "Vulnerable by Design" multi cloud deployment tool. Currently supported cloud vendors include Alibaba Cloud, Tencent...
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeoveras well as mDNS, LLMNR and NetBIOS-NS spoofing pretender is a...
LAUREL is an event post-processing plugin for auditd(8) to improve its usability in modern security monitoring setups. Why? TLDR: Instead...
bpflock - eBPF driven security for locking and auditing Linux machines. Note: bpflock is currently in experimental stage, it may...
Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.)Features Stealer Discord TokenDiscord Info - Username, Phone number, Email,...
To see the tool in its most useful form, try running the command as follows: python3 modDetective.py -i /usr/share,/usr/lib,/lib. This...
Generates lists of live hosts and URLs for targeting, automating the usage of Massdns, Masscan and nmap to filter out...
Reverse engineering using a full system simulator. Dynamic analysis by instrumenting simulated hardware using Simics Trace process trees, system calls...
Pown CDB is a Chrome Debug Protocol utility. The main goal of the tool is to automate common tasks to...
Pinecone is a WLAN networks auditing tool, suitable for red team usage. It is extensible via modules, and it is...
Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via...
ZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as...
kubeaudit is a command line tool and a Go package to audit Kubernetes clusters for various different security concerns, such...
Dumpscan is a command-line tool designed to extract and dump secrets from kernel and Windows Minidump formats. Kernel-dump parsing is...
TruffleHog Find leaked credentials. Join The Slack Have questions? Feedback? Jump in slack and hang out with us docker run...
Tool that tests MANY url bypasses to reach a 40X protected page. If you wonder why this code is nothing...
Please read this blog post to get more information. Source Code This code is a modified version of Microsoft's WebView2...
A modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more....