Moonwalk – Cover Your Tracks During Linux Exploitation By Leaving Zero Traces On System Logs And Filesystem Timestamps
Cover your tracks during Linux Once you get a shell into the target Unix machine, start a moonwalk session by...
Cover your tracks during Linux Once you get a shell into the target Unix machine, start a moonwalk session by...
A flexible tool that creates a minidump of the LSASS process. 1. Features It uses syscalls (with SysWhispers2) for most...
If you compromise an account member of the group Backup Operators you can become the Domain Admin without RDP or...
Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many of the API key, allowing to...
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web...
Username Enumeration And Reconnaisance Suite Supported sites PyPI Github TestPypi About.me Instagram DockerHub Installation Clone project: $ git clone...
Debugging module for Malware Analysis Automation For a step by step post on how to use Lupo, with images and...
iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift! If you...
Rip Raw is a small tool to analyse the memory of compromised Linux systems. It is similar in purpose to...
Detecting Color Preference To get the most out of this you should determine the OS from the user agent and...
O365-Doppelganger is NOT a replacement for hardcore Download O365-Doppelganger If you like the site, please consider joining the telegram channel...
The VulFi (Vulnerability Finder) tool is a plugin to IDA Pro which can be used to assist during bug hunting...
A modern, simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection firewalls....
A proof-of-concept WordPress plugin fuzzer used in the research described in . That means that the fuzzer detected executing fopen()...
In Linux in order to run a program it must exist as a file, it must be accessible in some...
A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities Features Support for lists of...
Simple Malware Scanner written in python Very basic malware Scanner by hash comparison Sometimes this can be needed when an...
A tool to dump a git repository from a website. Install This can be installed easily with pip: pip install...
Spock SLAF is a Shared Library Application Firewall "SLAF". It has the purpose to protect any service that uses the...
Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information Preface If you're just getting started with...
How eCapture works SSL/TLS text context capture, support opensslgnutlsnspr(nss) libraries. bash audit, eCapture User Manual Getting started use ELF binary...
Killing features Scan with nmap fast! Allows you to scan targets with Masscan and run Nmap on discovered ports...
This is a DFIR tool for generating a macOS Presentation This tool was published on Japan Security Analyst Conference 2022...
A script to Contributing Pull requests are welcome. Feel free to open an issue if you want to add other...