AceLdr – Cobalt Strike UDRL For Memory Scanner Evasion
A position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy...
A position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy...
REST-Attacker is an automated penetration testing framework for APIs following the REST architecture style. The tool's focus is on streamlining...
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other...
ExchangeFinder is a simple and open-source tool that tries to find Micrsoft Exchange instance for a given domain based on...
An automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022....
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out...
Subparse, is a modular framework developed by Josh Strochein, Aaron Baker, and Odin Bernstein. The framework is designed to parse...
A Python3 terminal application that contains 260+ Neo4j cyphers for BloodHound data sets. Why? BloodHound is a staple tool for...
S3cret Scanner tool designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets...
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to: Identify and...
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the...
Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider. Havoc is in an early state...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
As last year, this year we made a ranking with the most popular tools between January and December 2022. Topics...
S3cret Scanner tool designed to provide a complementary layer for the Contributing Pull requests and forks are welcome. For major...
We’ve been using GitHub actions for Empire and Starkiller for quite some time now. It’s been a significant productivity boost...
A project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is...
SquarePhish is an advanced The victim will then scan the QR code found in the email body with their mobile...
Microsoft disclosed technical details of a vulnerability in Apple macOS that could be exploited by an attacker to bypass Gatekeeper....