Atomic-Operator : A Python Package Is Used To Execute Atomic Red Team Tests

3 years ago

atomic-operator enables security professionals to test their detection and defensive capabilities against prescribed techniques defined within atomic-red-team. By utilizing a testing framework…

COM-Hunter : COM Hijacking VOODOO

3 years ago

COM-hunter is a COM Hijacking persistence tool written in C#. Features Finds out entry valid CLSIDs in the victim's machine.Finds…

CRLFsuite : Fast CRLF Injection Scanning Tool

3 years ago

CRLFsuite is a fast tool specially designed to scan CRLF injection. Installation $ git clone https://github.com/Nefcore/CRLFsuite.git$ cd CRLFsuite$ sudo python3 setup.py…

Cybersecurity in No-Code platforms: Key Principles

3 years ago

If you're developing an application using no-code platform, it's important to understand the risks of cybersecurity. A no-code software makes…

SMB-Session-Spoofing : Tool To Create A Fake SMB Session

3 years ago

SMB-Session-Spoofing is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program is…

Notionterm : Embed Reverse Shell In Notion Pages

3 years ago

Notionterm is a Embed Reverse Shell In Notion Pages Hiding attacker IP in reverse shell (No direct interaction between attacker and…

Zap-Scripts : Zed Attack Proxy Scripts For Finding CVEs And Secrets

3 years ago

Zap-Scripts is a Zed Attack Proxy Scripts for finding CVEs and Secrets. Building This project uses Gradle to build the…

PowerGram : Multiplatform Telegram Bot In Pure PowerShell

3 years ago

PowerGram is a pure PowerShell Telegram Bot that can be run on Windows, Linux or Mac OS. To make use of…

Labtainers : A Docker-based Cyber Lab Framework

3 years ago

Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or install on…

K0Otkit : Universal Post-Penetration Technique Which Could Be Used In Penetrations Against Kubernetes Clusters

3 years ago

k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters. With k0otkit, you can manipulate…