CyberChef – The Cyber Swiss Army Knife – A Web App For Encryption, Encoding, Compression And Data Analysis
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These...
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These...
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to...
sttr is command line software that allows you to quickly run various transformation operations on the string. // With input...
Pip-Intel is a powerful tool designed for OSINT (Open Source Intelligence) and cyber intelligence gathering activities. It consolidates various open-source...
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating...
A utility for identifying web page inputs and conducting XSS scanning. Features: Subdomain Discovery: Retrieves relevant subdomains for the target...
A tool to generate a wordlist from the information present in LDAP, in order to crack non-random passwords of domain...
Install To install headerpwn, run the following command: go install github.com/devanshbatham/[email protected] Usage headerpwn allows you to test various headers on...
SherlockChain is a powerful smart contract analysis framework that combines the capabilities of the renowned Slither tool with advanced AI-powered...
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power...
This is a simple SBOM utility which aims to provide an insider view on which packages are getting executed. The...
EvilSlackbot A Slack Attack Framework for conducting Red Team and phishing exercises within Slack workspaces. Disclaimer This tool is intended...
Howdy! My name is Harrison Richardson, or rs0n (arson) when I want to feel cooler than I really am. The...
Reaper is a proof-of-concept designed to exploit BYOVD (Bring Your Own Vulnerable Driver) driver vulnerability. This malicious technique involves inserting...
ROPDump is a tool for analyzing binary executables to identify potential Return-Oriented Programming (ROP) gadgets, as well as detecting potential...
Tags: Aspx, Encryption, Entropy, Hashes, Malware, Obfuscation, PowerShell, Processes, Scan, Scanning, Scripts, Toolbox, ShellSweepShellSweep - ShellSweeping the evil.Shellsweep - Shellsweeping...
Retrieve and display information about active user sessions on remote computers. No admin privileges required. The tool leverages the remote...
Hakuin is a Blind SQL Injection (BSQLI) optimization and automation framework written in Python 3. It abstracts away the inference...
Subdomain takeover is a common vulnerability that allows an attacker to gain control over a subdomain of a target domain...
The original 403fuzzer.py :) Fuzz 401/403ing endpoints for bypasses This tool performs various checks via headers, path normalization, verbs, etc....
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads. Features: Uses ICMP for Command and Control Undetectable by most...
LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call...
SQLMC (SQL Injection Massive Checker) is a tool designed to scan a domain for SQL injection vulnerabilities. It crawls the...
BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR. How it works? BadExclusionsNWBO copies...