Friday, March 24, 2023

New Tools

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: ...

Tracgram : Use Instagram location features to track an account

Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple: 1. Download this repository 2. Go through the...

Probable_Subdomains : Subdomains Analysis And Generation Tool

Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is...

Where to get knowledge and information about the World of Warcraft for beginners

Despite the fact that World of Warcraft has more than 10 years of history of active development, the project still remains difficult for players...

Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup

Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking...

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the...

Faraday : Open Source Vulnerability Management Platform

Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you...

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py Options: -h, --help show this help message and...

OffensivePipeline : To Download And Build C# Tools, To Improve Their Evasion For Red Team Exercises

OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use...

Misp-Extractor : Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)

Misp-Extractor is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and...

Tools

SocialPwned : An OSINT Tool That Allows To Get The Emails, From A Target,...

0
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks like Instagram, Linkedin and Twitter to...
SIEM Guide

SIEM – Security Information and Event Management Tools – A Beginner’s Guide

0
What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the primary function of a SIEM is Event management....

SUB 404 : A Fast Tool To Check Subdomain Takeover Vulnerability

0
Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerability and it is fast as it...

Online Password Bruteforce with Hydra-GTK

0
Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like telnet, ssh, http, https,...

Netdiscover – Live Host Identification

0
Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner that can be used to scan...

Havij Download – Advanced Automated SQL Injection Tool

0
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely...