GitOops : All Paths Lead To Clouds

4 years ago

GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by…

BruteLoops : Protocol Agnostic Online Password Guessing API

4 years ago

BruteLoops is a dead simple library providing the foundational logic for efficient password brute force attacks against authentication interfaces. See…

FUSE : A Penetration Testing Tool For Finding File Upload Bugs

4 years ago

FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing…

LinuxCatScale : Incident Response Collection And Processing Scripts With Automated Reporting Scripts

4 years ago

Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based…

Azur3Alph4 : A PowerShell Module That Automates Red-Team Tasks For Ops On Objective

4 years ago

Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE…

ForgeCert : “Golden” Certificates

4 years ago

ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for arbitrary users…

Rdesktop : Open Source Client for Microsoft’s RDP protocol

4 years ago

Rdesktop is an open source client for Microsoft's RDP protocol. It is known to work with Windows versions ranging from…

Xmap : A Fast Network Scanner Designed For Performing Internet-wide IPv6 &Amp; IPv4 Network Research Scanning

4 years ago

XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and…

PowerShx : Run Powershell Without Software Restrictions

4 years ago

PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run…

5 Essential Recovery Steps after a Trojan Horse Virus Attack

4 years ago

The best form of defense against a Trojan horse attack is prevention. Always ensure that the emails, websites, and links…