Rathole : A Lightweight, Stable And High-Performance Reverse Proxy For NAT Traversal

3 years ago

Rathole, like frp and ngrok, can help to expose the service on the device behind the NAT to the Internet, via a server…

RecoverPy : Interactively Find And Recover Deleted Or Overwritten Files From Your Terminal

3 years ago

RecoverPy searches through every block of your partition to find your request. You can already find plenty of solutions to…

Bluffy : Convert Shellcode Into Different Formats

3 years ago

Bluffy is a utility which was used in experiments to bypass Anti-Virus products (statically) by formatting shellcode into realistic looking…

Kerbrute : An Script To Perform Kerberos Bruteforcing By Using Impacket

3 years ago

Kerbrute is a script to perform kerberos bruteforcing by using the Impacket library. When is executed, as input it receives…

CRT : CrowdStrike Reporting Tool for Azure

3 years ago

CRT is a tool to queries the following configurations in the Azure AD/O365 tenant which can shed light on hard-to-find…

Mininode : A CLI Tool To Reduce The Attack Surface Of The Node.js Applications By Using Static Analysis

3 years ago

Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis of source…

Gh-Dork : Github Dorking Tool

3 years ago

Gh-Dork is a Github Dorking Tool. Supply a list of dorks and, optionally, one of the following: a user (-u)a…

BloodyAD : An Active Directory Privilege Escalation Framework

3 years ago

BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py and autobloody.py. This framework supports…

Ninjas workout : Vulnerable NodeJS Web Application

3 years ago

Ninjas workout is a Vulnerable NodeJS Web Application. Quick Start Download the Repo =>run npm i After Installing all dependency just run…

FACT : A Tool To Collect, Process And Visualise Forensic Data From Clusters Of Machines

3 years ago

FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or…