PowerShx : Run Powershell Without Software Restrictions

3 years ago

PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run…

5 Essential Recovery Steps after a Trojan Horse Virus Attack

3 years ago

The best form of defense against a Trojan horse attack is prevention. Always ensure that the emails, websites, and links…

Viper : Intranet Pentesting Tool With Webui

3 years ago

Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process…

Attack-Surface-Framework : Tool To Discover External And Internal Network Attack Surface

3 years ago

Attack-Surface-Framework aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP…

SpoolSploit : A Collection Of Windows Print Spooler Exploits

3 years ago

SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly…

PKINITtools : Tools For Kerberos PKINIT And Relaying To AD CS

3 years ago

PKINITtools repository contains some utilities for playing with PKINIT and certificates.The tools are built on minikerberos and impacket. Accompanying blogpost with more context: https://dirkjanm.io/ntlm-relaying-to-ad-certificate-services/…

Smersh : A Pentest Oriented Collaborative Tool

3 years ago

Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport. Preview…

Scrummage : The Ultimate OSINT And Threat Hunting Framework

3 years ago

Scrummage is an OSINT tool that centralises search functionality from powerful, yet simple OSINT sites. This project draws inspiration mainly…

pFuzz : Helps Us To Bypass Web Application Firewall By Using Different Methods At The Same Time

3 years ago

pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web…

Guide to Relational Databases

3 years ago

Databases have been used by various organizations to solve business problems for a very long time. In the early days,…