lazygit - A simple terminal UI for git commands written in Go
You've heard it before, git is powerful, but what good is that power when everything is so damn hard to do? Interactive rebasing requires you to edit a goddamn TODO file in your editor? Are you kidding...
View ArticleXencrypt - A PowerShell script anti-virus evasion tool
Xencrypt is a PowerShell crypter v 1.0. Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it be awesome if you could take...
View ArticleSubfinder is a subdomain discovery tool that discovers valid subdomains for...
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built...
View ArticleFinal Recon - OSINT Tool for All-In-One Web Reconnaissance
Final Recon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. The tool is available in Black Arch Linux and...
View ArticleThe LAZY script will make your life easier, and of course faster
Lazy - This is a script for Kali Linux that automates many procedures about wifi penetration and hacking. I actually made it for fun for me just to save some time, but I don't mind publishing it. For...
View ArticleGadgetinspector - A Byte Code Analyzer For Finding Deserialization Gadget...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. By automatically discovering possible gadgets...
View ArticleXCTR Hacking Tools - All in one for Information Gathering
Read Me Initially, you need to create a project where you will save everything. All of the collected information is saved as "project-name" in the results directory. You can update user agent and...
View ArticleWiFi Passview - An open source batch script based WiFi Passview for Windows
WiFi Passview is an open-source batch script-based program that can recover your WiFi Password easily in seconds. This is for Windows OS only. Basically, this scripted program has the same function as...
View ArticlePrivescCheck - Privilege Escalation Enumeration Script for Windows
PrivescCheck script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information that might be useful for exploitation...
View ArticleAbaddon - makes red team operations faster, more repeatable and stealthier
Abaddon - Red team operations involve miscellaneous skills, the last several months and are politically sensitive; they require a lot of monitoring, consolidating and caution. Wavestone’s red team...
View ArticlePhonia - most advanced toolkits to scan phone numbers using only free resources
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any...
View ArticleGhost Framework - uses an ADB to remotely access an Android device
Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android...
View ArticleHoneyBot - Capture, Upload And Analyze Network Traffic
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently, this library provides three scripts: capture-and-analyze.py - Capture on an...
View ArticleExtended XSS Searcher and Finder - scans for different types of XSS on a list...
XSS Searcher is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker to perform not only GET but also POST requests. Additionally,...
View ArticleAsynchronous reverse shell using the HTTP protocol.
Today there are many ways to create a reverse shell in order to be able to remotely control a machine through a firewall. Indeed, outgoing connections are not always filtered. However, security...
View ArticleWhy Hospitals Need to Focus on Cybersecurity Training by Jori Hamilton
Image Source: Pexels The medical industry has benefited greatly from technological advances. From widespread adoption of the cloud making access to patient records more efficient, to the use of...
View ArticleCapture credentials with Wireshark [FREE COURSE CONTENT]
In this video from our ARP Poisoning course we take a look at how we can use Wireshark to capture credentials. This was part of the ARP poisoning attack we were studying in the course, but you can...
View ArticleWhy Use a Third-Party Threat Intel Platform to Enhance Cyber Defense by...
With the continued rise of new threats daily, a purely reactive approach to cybersecurity can land businesses in the latest headlines. Enterprises, big and small, would be wise to assume the worst—that...
View ArticleTheFatRat - A Massive Exploiting Tool
TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to...
View ArticleSifter - an OSINT, recon and vulnerability scanner
Sifter is an OSINT, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote...
View Article