Toutatis – A Tool That Allows You To Extract Information From Instagrams Accounts Such As E-Mails, Phone Numbers And More
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more...
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more...
Bypass 4xx HTTP response status codes. Based on PycURL. Script uses multithreading, and is based on brute forcing so might...
Tool that automates cracking of WPA-2 Wi-Fi credentials using client-server architecture Requirements Airstrike uses Hashcat Brain Architecture, aircrack-ng suite, entr...
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. IAM Vulnerable uses the Terraform binary...
This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification. Generate Header from CSV...
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly...
ClusterFuzzLite is a continuous fuzzing solution that runs as part of Continuous Integration (CI) workflows to find vulnerabilities faster than...
Yet another An example run with auto calibration and recursive mode enabled Example reports Example reports can be found here...
Kerberos attack toolkit -pure python- Install pip3 install kerberoast Prereqirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted...
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain...
Netcat like reverse shell for Linux & Windows. Features WindowsUsage:└ Shared Commands: !exit !upload <src> <dst> * uploads a file...
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then...
Kit Hunter: A basic phishing kit detection tool Version 2.6.0 28 September 2021 Testing and development took place on Python...
Features of Repository =================== Hands-on Download Digital-Forensics-Lab If you like the site, please consider joining the telegram channel or supporting...
My experiments in weaponizing Rust for implant development and general offensive operations. Why Rust? It is faster than languages like...
DetectionLabELK is a fork from Chris Long's DetectionLab with ELK stack instead of Splunk.Description: DetectionLabELK is the perfect lab to...
>_ Introduction 4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE :...
Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more...
FakeDataGen is a Full Valid Fake Data Generator.This tool helps you to create fake accounts (in Spanish format) with fully...
ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed...
The recommended module is o365 for SearchEngineThis module should be used to retrieve a list of email addresses before validating...
Web Service write in Python for control and protect your android device remotely. The official app can be found on the...
PyQT app to list all Download LOLBins If you like the site, please consider joining the telegram channel or supporting...
RedHerd is a collaborative and DisclaimerThe provided contents and tools are for awareness and research purposes only. Our target audience...