Fennec : Artifact Collection Tool For *Nix Systems

3 years ago

Fennec is an artifact collection tool written in Rust to be used during incident response on *nix based systems. fennec…

ICMP-TransferTools : Transfer Files To And From A Windows Host Via ICMP In Restricted Network Environments

3 years ago

ICMP-TransferTools is a set of scripts designed to move files to and from Windows hosts in restricted network environments. This…

Covert-Control : Google Drive, OneDrive And Youtube As Covert-Channels – Control Systems Remotely By Uploading Files To Google Drive, OneDrive, Youtube Or Telegram

3 years ago

Covert-Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram using Python to create the files and…

FormatFuzzer : A Framework For High-Efficiency, High-Quality Generation And Parsing Of Binary Inputs

3 years ago

FormatFuzzer is a framework for high-efficiency, high-quality generation and parsing of binary inputs. It takes a binary template that describes the format of a binary…

Live-Forensicator : Powershell Script To Aid Incidence Response And Live Forensics

3 years ago

Live Forensicator is part of the Black Widow Toolbox, its aim is to assist Forensic Investigators and Incidence responders in…

Phantun : Transforms UDP Stream Into (Fake) TCP Streams That Can Go Through Layer 3 &Amp

3 years ago

Phantun is a project that obfuscated UDP packets into TCP connections. It aims to achieve maximum performance with minimum processing…

CobaltBus : Cobalt Strike External C2 Integration With Azure Servicebus, C2 Traffic Via Azure Servicebus

3 years ago

CobaltBus is a Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus Setup Create an Azure…

Odin : Central IoC Scanner Based On Loki

3 years ago

Odin is a central IoC scanner based on Loki. General Info This application Loki latest version and download it on all…

Auto-Elevate : Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM

3 years ago

Auto-Elevate tool demonstrates the power of UAC bypasses and built-in features of Windows. This utility auto-locates winlogon.exe, steals and impersonates it's…

Subdomains.Sh : A Wrapper Around Tools I Use For Subdomain Enumeration On A Given Domain

3 years ago

Subdomains.Sh is a wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in…