HackTools - The all-in-one Red Team extension for Web Pentester
HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells, and much...
View ArticleBluescan - A powerful Bluetooth scanner for scanning BR/LE devices, LMP, SDP,...
Bluescan is an open source project by Sourcell Xu from DBAPP Security HatLab. Anyone may redistribute copies of bluescan to anyone under the terms stated in the GPL-3.0 license. Aren't the previous...
View Articleiblessing - iOS security exploiting toolkit for hackers and pentesters
iblessing is iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis.iblessing is based on unicorn engine and capstone engine....
View ArticleGeo-Recon - An OSINT CLI Tool Desgined To Fast Track IP Reputation And...
Geo-Recon is an OSINT CLI tool designed to fast track IP Reputation and Geo-location lookup for Security Analysts. Setup This tool is compatible with: Any Linux Operating System (Debian, Ubuntu,...
View Articleh4rpy - an automated WPA/WPA2 PSK attack tool
h4rpy provides a clean interface for automated cracking of WPA/WPA2 PSK networks. h4rpy enables monitor mode on a selected wireless interface, scans the wireless space for access points, tries to...
View ArticleA Closer Look at OWASP Top 10 by Ilai Bavati
OWASP top 10 is a document that prioritized vulnerabilities, provided by the Open Web Application Security Project (OWASP) organization. OWASP is a non-profit dedicated to improving software security....
View ArticleAutovpn - Create On Demand Disposable OpenVPN Endpoints On AWS
Autovpn is a script that allows the easy creation of OpenVPN endpoints in any AWS region. Creating a VPN endpoint is done with a single command that takes ~3 minutes. It will create the proper security...
View Articlebbrecon (Bug Bounty Recon) - Python library and CLI for the Bug Bounty Recon API
Bug Bounty Recon (bbrecon) is a free Recon-as-a-Service for bug bounty hunters and security researchers. The API aims to provide a continuously up-to-date map of the Internet "safe harbor" attack...
View ArticleBrowsertunnel - Surreptitiously exfiltrate data from the browser over DNS
Browsertunnel is a tool for exfiltrating data from the browser using the DNS protocol. It achieves this by abusing dns-prefetch, a feature intended to reduce the perceived latency of websites by doing...
View ArticleWmihacker - A Bypass Anti-virus Software Lateral Movement Command Execution Tool
Bypass anti-virus software lateral movement command execution test tool(No need 445 Port) Introduction: The common WMIEXEC, PSEXEC tool execution command is to create a service or call...
View ArticleHTTP-revshell - Powershell reverse shell using HTTP/S protocol with AMSI...
HTTP-revshell is a tool focused on red team exercises and pentesters. This tool provides a reverse connection through the HTTP/s protocol. It uses a covert channel to gain control over the victim...
View ArticleShared vs Dynamic Linking in Reverse Engineering [FREE COURSE VIDEO]
In this video from our Reverse Engineering with Ghidra online course we want to show you how to deal with shared vs dynamic linking in your reverse engineering tasks. We're using Ghidra as our main...
View ArticleRbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From...
This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active Directory Domain. The difference from other common implementations is that we are...
View ArticleCRLFuzz - A fast tool to scan CRLF vulnerability written in Go
Installation from Binary The installation is easy. You can download a prebuilt binary from the releases page, unpack and run! or with ▶ curl -sSfL http://git.io/get-crlfuzz | sh -s -- -b /usr/local/bin...
View ArticleRanked: The European countries most at risk of RDP Brute-Force attacks
The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been reliant on remote desktop connections to enable their employees to...
View ArticleMoriarty Project - This tool gives information about the phone number that...
What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provided; ->Tries To Find Owner Of The Number...
View ArticleGRAT2 - Command and Control (C2) tool written in python3 and the client in...
GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea came from Georgios Koumettou who initiated the project. Why we developed GRAT2? We are aware that...
View ArticleList of Free Python Resources [Updated September 2020]
Python is considered as a beginner-friendly programming language and its community provides many free resources for beginners and more advanced users. Our team had gathered the most helpful free...
View ArticleWinshark - Wireshark plugin to work with Event Tracing for Windows
Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were removed from microsoft.com sites on November 25, 2019. Wireshark has...
View ArticleVMPDump - A dynamic VMP dumper and import fixer, powered by VTIL.
A dynamic VMP dumper and import fixer, powered by VTIL. Works for VMProtect 3.X x64. Before vs After Usage VMPDump.exe <Target PID> "<Target Module>" [-ep=<Entry Point RVA>]...
View Article