Pycrypt : Python Based Crypter That Can Bypass Any Antivirus Products

3 years ago

Pycrypt is a python-based Crypter that can bypass any antivirus product. Antivirus software are protecting computers from malicious software including…

EvilTree : A Remake Of The Classic “Tree” Command

3 years ago

EvilTree is a standalone python3 remake of the classic "tree" command with the additional feature of searching for user provided…

Kubeeye : Tool To Find Various Problems On Kubernetes

3 years ago

KubeEye is an inspection tool for Kubernetes. It discovers whether Kubernetes resources (by using OPA ), cluster components, cluster nodes…

MSMAP : Memory WebShell Generator

3 years ago

Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients.…

SharpSCCM : A C# Utility For Interacting With SCCM

3 years ago

SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and…

Octopii : An AI-powered Personal Identifiable Information (PII) Scanner

3 years ago

Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs,…

Scrcpy : Display And Control Your Android Device

3 years ago

Scrcpy application provides display and control of Android devices connected via USB or over TCP/IP. It does not require any…

Ox4Shell : Deobfuscate Log4Shell Payloads With Ease

3 years ago

Ox4Shell is a tool for deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many…

Is This App Download Safe? A Guide To Secure Your Mobile Device

3 years ago

It’s easier than ever to download apps onto your mobile devices. Unfortunately, it’s also become more likely that you could…

Stegowiper : A Powerful And Flexible Tool To Apply Active Attacks For Disrupting Stegomalware

3 years ago

Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all…