PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run…
The best form of defense against a Trojan horse attack is prevention. Always ensure that the emails, websites, and links…
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process…
Attack-Surface-Framework aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP…
SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly…
PKINITtools repository contains some utilities for playing with PKINIT and certificates.The tools are built on minikerberos and impacket. Accompanying blogpost with more context: https://dirkjanm.io/ntlm-relaying-to-ad-certificate-services/…
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport. Preview…
Scrummage is an OSINT tool that centralises search functionality from powerful, yet simple OSINT sites. This project draws inspiration mainly…
pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web…
Databases have been used by various organizations to solve business problems for a very long time. In the early days,…