FUD-UUID-Shellcode : Another Shellcode Bypass Windows Defender

2 years ago

FUD-UUID-Shellcode is another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID…

SteaLinG : Open-Source Penetration Testing Framework Designed For Social Engineering

2 years ago

The SteaLinG is an open-source penetration testing framework designed for social engineering After the hack, you can upload it to…

Monkey365 – Tool For Security Consultants Microsoft 365

2 years ago

Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also…

HSTP – Simple Hyper Service Transfer Protocol On Networks

2 years ago

HSTP protocol aims to develop a application layer abstraction for the Hyper Service Transfer Protocol. HSTP is a recursion as…

EvilnoVNC – Ready To Go Phishing Platform

2 years ago

EvilnoVNC is a Ready to go Phishing Platform. Unlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real…

AoratosWin : A Tool That Removes Traces Of Executed Applications On Windows OS

2 years ago

AoratosWin is a tool that removes traces of executed applications on Windows OS which can easily be listed with tools…

Cloudfox – Automating Situational Awareness For Cloud Penetration Tests

2 years ago

CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help…

Arsenal – Recon Tool Installer

2 years ago

Arsenal is a Simple shell script (Bash) used to install the most important tools and requirements for your environment and…

Erlik 2 : Vulnerable Flask App

2 years ago

Erlik 2 is a vulnerable Flask Web App. It is a lab environment created for people who want to improve…

Utkuici – Nessus Automation

2 years ago

Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great…