Whispers : Identify Hardcoded Secrets In Static Structured Text

4 years ago

Whispers is a static code analysis tool designed for parsing various common data formats in search of hardcoded credentials and…

UDP-Hunter : Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols

4 years ago

UDP-Hunter is a UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top…

ThreatBox : A Standard And Controlled Linux Based Attack Platform

4 years ago

ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started…

How to Start a Coaching Business Online

4 years ago

If you're interested in starting a coaching business, there are several things you should do before you get started. These…

ThreadBoat : Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application

4 years ago

ThreadBoat is a Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. About I developed this…

Stacs : Static Token And Credential Scanner

4 years ago

Stacs is a YARA powered static credential scanner which supports binary file formats, analysis of nested archives, composable rulesets and ignore lists,…

SillyRAT : A Cross Platform Multifunctional (Windows/Linux/Mac) RAT

4 years ago

SillyRAT is a cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as…

Registry-Recon : Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon

4 years ago

Registry-Recon is a Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon. Description As a red-team practitioner, we are often using…

pwnSpoof : Generates realistic spoofed log files for common web servers with customisable attack scenarios

4 years ago

pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customizable attack scenarios. Every log bundle is…

Nosferatu : Lsass NTLM Authentication Backdoor

4 years ago

Nosferatu is a Lsass NTLM Authentication Backdoor How It Works First, the DLL is injected into the lsass.exe process, and will begin…