AutoPWN Suite – Project For Scanning Vulnerabilities And Exploiting Systems Automatically
AutoPWN Suite is a project for scanning Installation You can install it using pip. (sudo recommended) sudo pip install autopwn-suite...
AutoPWN Suite is a project for scanning Installation You can install it using pip. (sudo recommended) sudo pip install autopwn-suite...
Installation From Binary You can download the pre-built binaries from the releases page and run. For example: wget https://github.com/utkusen/socialhunter/releases/download/v0.1.1/socialhunter_0.1.1_Linux_amd64.tar.gz tar...
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It...
Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on...
lockc is open source sofware for providing MAC (Mandatory Access Control) type of security audit for container workloads. The main...
This repository is a documentation of my adventures with Attack Description Link aws.credential-access.ec2-get-password-data Retrieve EC2 Password Data Link aws.credential-access.ec2-steal-instance-credentials Steal...
Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a...
Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with...
.NET Framework 4.8 Usage Usage: .COM-Hunter.exe <mode> <options>-> General Options: -h, --help Shows help and exits. -v, --version Shows current...
CRLFsuite is a fast tool specially designed to scan CRLF injection. Installation $ git clone https://github.com/Nefcore/CRLFsuite.git$ cd CRLFsuite$ sudo python3 setup.py...
Welcome! This is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program...
This python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments. (What's new?) Why?...
Embed FOR: Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as...
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS...
Zed Attack Proxy Scripts for finding CVEs and Secrets. Building This project uses Gradle to build the ZAP add-on, simply...
PowerGram is a pure PowerShell Telegram Bot that can be run on Windows, Linux or Mac OS. To make use...
Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store...
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters. With k0otkit, you can manipulate...
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or...
A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut...
A tool for automatically converting Run the first pass of mitmproxy2swagger: $ mitmproxy2swagger -i <path_to_mitmptoxy_flow> -o <path_to_output_schema> -p <api_prefix> Please...
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing WAFs and other reverse proxies. How does...
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a...
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN is a protocol mostly...