Rconn – Rconn Is A Multiplatform Program For Creating Generic Reverse Connections
rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT...
rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT...
A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the...
This project's goal is to be simple to create and destroy your own VPN service using WireGuard.PrerequisitesTerraform >= 1.0.0 Ansible...
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. PurposeBrute-forcing website...
In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...
Why crack hashes when you can bust them?FeaturesAutomatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract &...
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like...
Download Regexploit If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Crawl SMB shares for juicy information. File content searching + regex is supported! File types supported:PDF DOCX XLSX PPTX any...
A simple multi-threaded distributed SSH brute-forcing tool written in Python.How it WorksWhen the script is executed without the --proxies switch,...
What is n8n?n8n (pronounced n-eight-n) helps you to interconnect every app with an API in the world with each other...
ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of...
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create...
Cilium is open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application...
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana...
The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly...
The goal is to list exploitation mitigations added over time in various operating systems, software, libraries or hardware. It becomes...
Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to...
A collection of hardware s that aid in red team operations. This repository will help you during red team engagement....
wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themesThe author...
Complete Arsenal of Memory injection and other techniques for red-teaming in WindowsWhat does Injector do?Process injection support for shellcode located...