Request_Smuggler – Http Request Smuggling Vulnerability Scanner
Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to...
Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to...
Tests ZKar is a well-tested tool that passed all ysoserial generated gadgets parsing and rebuilding tests. It means that gadget...
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. Why on earth didn't...
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a running operating system....
Docker By using docker you won't be able to use --filepath and --historypath , but you can set volume(host path...
ADExplorerSnapshot.py is an AD Notes This library is now supporting the BloodHound v4.1+ output format (JSON format v4). For the...
An easily modifiable shellcode template for Get Started Clone this project and you are ready to start git clone https://www.github.com/Cracked5pider/ShellcodeTemplate...
FastFinder is a lightweight tool made for threat hunting, live forensics and triage on both Windows and Linux Platforms. It...
VPN Overall Reconnaissance, Testing, Enumeration and This kind of behaviour makes Vortex really easy to use. General Workflow Vortex has...
Oh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses...
PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic...
Test AWS S3 buckets for read/write/delete access This tool was developed to quickly test a list of s3 buckets for...
A BurpSuite plugin intended to help with Credits Created with <3 by Download Nuclei-Burp-Plugin If you like the site, please...
Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts. Ghostbuster obtains all the DNS...
Today, cyber attacks are more numerous and cause damage in companies. Nevertheless, many software products exist to detect cyber threats....
Epagneul is a tool to visualize and investigate Deployment Requires docker and docker-compose to be installed. Installing make Offline deployment...
The program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of...
This tool fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths and dangerous...
Introduction RefleXXion is a utility designed to aid in How to Use You can open and compile the project with...
WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral...
Patching A complete listing of the contextual patching actions are described in the following sections. Assemble The main patching dialog...
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The Executable Usage Download Lnkbomb from the releases...
Tencent Cloud Experience Apply Link Key Features Language support: It supports Java/C++/Objective-C/C#/JavaScript/Python/Go/PHP and more, covering common programming languages. Code inspection:...
Attackers think in graphs, defenders think in actions, Documentation All documentation can be found in the wiki Acknowledgments The py2neo...