Burp-Dom-Scanner – Burp Suite’s Extension To Scan And Crawl Single Page Applications
It's a Burp Suite's extension to allow for recursive crawling and scanning of Single Page Applications. It runs a Chromium...
It's a Burp Suite's extension to allow for recursive crawling and scanning of Single Page Applications. It runs a Chromium...
A GPT-empowered penetration testing tool. Common Questions Q: What is PentestGPT? A: PentestGPT is a penetration testing tool empowered by...
rebindMultiA is a tool to perform a Multiple A Record rebind attack. rebindmultia.com is a domain that I've set up...
EntropyReducer: Reduce The Entropy Of Youre Payload And Obfuscate It With Serialized Linked Lists How Does It Work EntropyReducer algorithm...
Nidhogg is a multi-functional rootkit for red teams. The goal of Nidhogg is to provide an all-in-one and easy-to-use rootkit...
bootlicker is a legacy, extensible UEFI firmware rootkit targeting vmware hypervisor virtual machines. It is designed to achieve initial code...
Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of...
Simple script to generate graphs and charts on hashcat (and john) potfile and ntds Install git clone https://github.com/Orange-Cyberdefense/graphcatcd graphcatpip install...
UEFI and SMM Assessment Tool Features Platbox is a tool that helps assessing the security of the platform: Dumps the...
Easy to use PowerShell script to enumerate access permissions in an Azure Active Directory environment. Background details can be found...
Acheron is a library inspired by SysWhisper3/FreshyCalls/RecycledGate, with most of the functionality implemented in Go assembly. acheron package can be...
Hades is a proof of concept loader that combines several evasion technques with the aim of bypassing the defensive mechanisms...
Note: This is a work-in-progress prototype, please treat it as such. Pull requests are welcome! You can get your feet...
A simple script just made for self use for bypassing 403 It can also be used to compare responses on...
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities Account...
WAFARAY is a LAB deployment based on Debian 11.3.0 (stable) x64 made and cooked between two main ingredients WAF +...
This tool is a simple PoC of how to hide memory artifacts using a ROP chain in combination with hardware...
Penetration tests on SSH servers using dictionary attacks. Written in C. brute krag means "brute force" in afrikáans Disclaimer This...
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other...
This is a command-line tool written in Python that applies one or more transmutation rules to a given password or...
Written by TMRSWRR Version 1.0.0 All in one tools for LFI VULN FINDER -LFI DORK FINDER Instagram: TMRSWRR Screenshots How...
TLDHunt is a command-line tool designed to help users find available domain names for their online projects or businesses. By...
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files. Done Related domains, IPs collect...
An advance cross-platform and multi-feature GUI web spider/crawler for cyber security proffesionals. Spider Suite can be used for attack surface...