Evil QR – Proof-of-concept To Demonstrate Dynamic QR Swap Phishing Attacks In Practice
Toolkit demonstrating another approach of a QRLJacking attack, allowing to perform remote account takeover, through sign-in QR code phishing. It...
Toolkit demonstrating another approach of a QRLJacking attack, allowing to perform remote account takeover, through sign-in QR code phishing. It...
Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be...
MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The...
HEDnsExtractor Raw html extractor from Hurricane Electric portal Features Automatically identify IPAddr ou Networks through command line parameter or stdin...
xsubfind3r is a command-line interface (CLI) utility to find domain's known subdomains from curated passive online sources. Features Fetches domains...
NETWORK Pcap File Analysis, It was developed to speed up the processes of SOC Analysts during analysis Tested OK DebianOK...
xcrawl3r is a command-line interface (CLI) utility to recursively crawl webpages i.e systematically browse webpages' URLs and follow links to...
A .NET malware loader, using API-Hashing and dynamic invoking to evade static analysis How does it work? NixImports uses my...
chaos is an 'origin' IP scanner developed by RST in collaboration with ChatGPT. It is a niche utility with an...
Columbus Project is an API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features. Columbus returned 638...
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later...
Welcome to HackBot, an AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also...
This project was built by pentesters for pentesters. Redeye is a tool intended to help you manage your data during...
While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a program to function, it...
Dredging Windows for Persistence What is it? Trawler is a PowerShell script designed to help Incident Responders discover potential indicators...
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration...
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects...
This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level...
This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new...
Documentation What is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous...
Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based...
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded...
Written by TMRSWRR Version 1.0.0 Instagram: TMRSWRR How to use LFI-FINDER is an open-source tool available on GitHub that focuses...
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions Installation: 1. git clone https://github.com/machine1337/TelegramRAT.git2. Now Follow...