Android-PIN-Bruteforce – Unlock An Android Phone (Or Device) By Bruteforcing The Lockscreen PIN
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
Scripted collection of system information valuable to a Forensic Analyst. IRTriage will automatically "Run As ADMINISTRATOR" in all Windows versions...
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses...
Powerfull Batch File To Disable Windows Defender,Firewall,Smartscreen And Execute the payloadUsage :Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the...
The developers swissknife. Do conversions and generations right out of vs code. Extendable with user scripts Available in the Visual...
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and...
A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing...
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of...
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of...
dwn is a "docker-compose for hackers". Using a simple YAML "plan" format similar to docker-compose, image names, versions and volume...
Zero config (IoT) firewall. SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement...
Simplistic yet fancy CPU architecture fetching tool1. Supportcpufetch currently supports x86_64 CPUs (both Intel and AMD) and ARM. Platform x86_64...
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on...
An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses.How it worksIt is a...
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down...
The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community...
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from...