4-ZERO-3 – 403/401 Bypass Methods + Bash Automation
>_ Introduction 4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE :...
>_ Introduction 4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE :...
Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more...
FakeDataGen is a Full Valid Fake Data Generator.This tool helps you to create fake accounts (in Spanish format) with fully...
ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed...
The recommended module is o365 for SearchEngineThis module should be used to retrieve a list of email addresses before validating...
Web Service write in Python for control and protect your android device remotely. The official app can be found on the...
PyQT app to list all Download LOLBins If you like the site, please consider joining the telegram channel or supporting...
RedHerd is a collaborative and DisclaimerThe provided contents and tools are for awareness and research purposes only. Our target audience...
A Wait-For-Exec ModeFor statically linked container runtimes, whoc comes in another flavor: whoc:waitforexec.upload_runtime is the image entrypoint, and runs as...
"My little birds are everywhere, even in the North, they whisper to me the strangest stories." - Lord VarysWhispers is...
UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the...
ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started...
Program uses Thread Usageint main(){ System sys; Interceptor incp; Exception exp; sys.returnVersionState(); if (sys.returnPrivilegeEscalationState()) { std::cout << "Token Privileges Adjustedn";...
Static Token And Credential ScannerWhat is it?STACS is a The performance is really, really bad when running in Docker on...
A Replace your IP Address and Port on above commands.Running ServerThe server must be executed on Linux. You can buy...
Cobalt Strike How does this work?Primarily, using Cobalt Strike's breg_query and breg_queryv functions. Then, all beacon output is hijacked with...
pwnSpoof (from About The ProjectpwnSpoof was created on the back of a Road MappwnSpoof is built to produce to authentic...
Lsass NTLM Login example using Impacket:LimitationsIn an Active Directory environment, authentication via RDP, runas, or the lock screen does not...
Microsoft The msticpy package was initially developed to support This is an unsupervised learning module implemented using SciKit Learn DBScan.More...
The Kubernetes Goat is designed to be an intentionally Upcoming Training's and SessionsDEFCON DEMO Labshttps://forum.defcon.org/node/237237Cloud Village - DEFCONhttps://cloud-village.org/#talks?collapseMadhuAkulaRecent Kubernetes Goat...
kube-applier is a service that enables kube-applier hosts a status page on a webserver, served at the service endpoint URL....
JVMXRay is a technology for monitoring access to system resources within the Java Virtual Machine. It’s designed with application security...
Hyenae NG (Next Generation) is a re-write of the original Hyenae tool which was originally published back in the year...
Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.This Web Extension could search OSINT information from some IOC in web...