AutoPentest-DRL – Automated Penetration Testing Using Deep Reinforcement Learning
AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. The framework determines the most appropriate...
AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. The framework determines the most appropriate...
A Black Path Toward The Sun(TCP tunneling over HTTP for web application servers) https://www.blackhat.com/us-16/arsenal.html#a-black-path-toward-the-sun Ben Lincoln, NCC Group, 2016 ABPTTS...
Search and extract blob files on the Ethereum network using Etherscan.io API.IntroductionEtherBlob Explorer is a tool intended for researchers, analysts,...
IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime...
In the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant...
msldapLDAP library for MS AD DocumentationAwesome documentation here! FeaturesComes with a built-in console LDAP client All parameters can be conrolled...
Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a "mediator" server that...
Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources...
Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of...
PowerShell module for Office 365 and Azure AD log collectionModule description The DFIR-O365RC PowerShell module is a set of functions...
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's...
C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or...
httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to...
An incredibly fast proxy checker & IP rotator with ease.FeaturesProxy IP rotator: Rotates your IP address for every specific request....
Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes,...
Full Automation Recon tool which works with Small and Medium scopes. ّIt's recommended to use it on VPS, it'll discover...
Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest! Snuffleupagus is a PHP 7+ and 8+...
Bypass User Account Control (UAC) to gain elevated (Administrator) privileges to run any program at a high integrity level. RequirementsAdministrator account...
APSoft Webscanner Version 2new version of APSoft Webscanner Version 1Software picturesWhat can i do with this ?with this software, you...
TL;DRDuring this RedTeam testing, Hexway team used Clubhouse as a social engineering tool to find out more about their client’s...
The network telemetry engine for data-driven security investigations. Getting Started — Installation — Documentation — Development — Changelog — License...
A tool for exploring and exploiting Firebase datastores.Set upgit clone https://github.com/iosiro/baserunner.git cd baserunner npm install npm run build npm start...
A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors...