MalSCCM – Tool To Abuse Local Or Remote SCCM Servers To Deploy Malicious Applications
This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage. To...
This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage. To...
CreditsAuthor: M3n0sD0n4ldTwitter: @David_UtonDescription:GooFuzz is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information...
Naabu is a port scanning tool written in Go that allows you to enumerate valid ports for hosts in a...
Finding all things on-prem Microsoft for password spraying and enumeration. The tool will used a list of common subdomains associated...
Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific...
This repository is a Dockerized php application containing some XSS vulnerability challenges. The ideas behind challenges are: Javascript validation bypass...
The Vulnerable API (Based on OpenAPI 3) VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from...
Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects,...
The idea of this project is to identify beacons which are unpacked at runtime or running in the context of...
In today's technological era, docker is the most powerful technology in each and every domain, whether it is Development, cyber...
This script scans every file from a given folder recursively, extracts every IPv4 and IPv6 address, filters out the public...
AWS Lambda is an event-driven, serverless computing platform provided by Amazon Web Services. It is a computing service that...
FrostByte Progolue: In the past few days I've been experimenting with the Steps to build Signed Shellcode Executable Pick any...
A burp suite extension that enumerates infrastructure and application Admin Interfaces. OWASP References: Classification: Web Application Security Testing > 02-Configuration...
A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell Description: A cross-platform shell generator tool that lets you...
GoReplay is an open-source network monitoring tool which can record your live Check latest documentation. Installation Download the latest binary...
Persistence by writing/reading shellcode from Event Log. Usage The SharpEventPersist tool takes 4 case-sensitive parameters: -file "C:pathtoshellcode.bin" -instanceid 1337 -source...
ConfluencePot is a simple honeypot for the Atlassian Confluence unauthenticated and remote OGNL injection vulnerability (CVE-2022-26134). About the vulnerability You...
DOMDig is a DOM XSS scanner that runs inside the Chromium web browser and it can scan single page applications...
Data exfiltration utility for testing detection capabilities Description Data exfiltration utility used for testing detection capabilities of security products. Obviously...
Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a...
Transparent endpoint security Features Block and detect advanced attacks Modern audited cryptography: RustCrypto for hashing and encryption Highly compatible: Development...
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. - Installation & Requirements: Installing Jeeves $ go...
Deepfence PacketStreamer is a high-performance remote PacketStreamer sensors collect raw network packets on remote hosts. It selects packets to capture...