Ermir : An Evil Java RMI Registry

2 years ago

Ermir is an Evil/Rogue RMI Registry, it exploits unsecure deserialization on any Java code calling standard RMI methods on it…

Threatest : Threatest Is A Go Framework For End-To-End Testing Threat Detection Rules

2 years ago

Threatest is a Go framework for testing threat detection end-to-end. Threatest allows you to detonate an attack technique, and verify…

The Rise of Hyper-Converged Infrastructure

2 years ago

Hyper-converged infrastructure (HCI) claims to simplify IT by merging storage, computation, and typically a virtualization environment in a single system…

Sandman : NTP Based Backdoor For Red Team Engagements In Hardened Networks

2 years ago

Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a…

Whids : Open Source EDR For Windows

2 years ago

Whids is a Open Source EDR For Windows with artifact collection driven by detection. The detection engine is built on…

ProtectMyTooling : Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry

2 years ago

ProtectMyTooling is a script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected…

Mangle : Tool That Manipulates Aspects Of Compiled Executables (.Exe Or DLL) To Avoid Detection From EDRs

2 years ago

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise…

Shomon : Shodan Monitoring Integration For TheHive

2 years ago

ShoMon is a Shodan alert feeder for TheHive written in GoLang. With version 2.0, it is more powerful than ever!…

Usbsas : Tool And Framework For Securely Reading Untrusted USB Mass Storage Devices

2 years ago

usbsas is a free and open source (GPLv3) tool and framework for securely reading untrusted USB mass storage devices. Description…

MHDDoS : DDoS Attack Script With 56 Methods

2 years ago

MHDDoS is a DDoS Attack Script With 56 Methods. But Don't Attack websites without the owners consent. Features And Methods…