Thunderstorm : Modular Framework To Exploit UPS Devices

2 years ago

Thunderstorm is a modular framework to exploit UPS devices. For now, only the CS-141 and NetMan 204 exploits will be…

RedTeam-Physical-Tools : Red Team Toolkit Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry

2 years ago

Red Team Toolkit is a curated list of tools that are commonly used in the field for Physical Security, Red…

X-force : IBM Security Utilitary Library In Python

2 years ago

X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries Install pip3 install…

Cortex-XDR-Config-Extractor : Cortex XDR Config Extractor

2 years ago

Cortex-XDR-Config-Extractor tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool…

APKHunt : Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework

2 years ago

APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although…

IpGeo : Tool To Extract IP Addresses From Captured Network Traffic File

2 years ago

IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing…

SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

2 years ago

SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet.…

CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

2 years ago

CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from…

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

2 years ago

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.…

Tracgram : Use Instagram location features to track an account

2 years ago

Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple:…