Much of an Ethical Hacker’s skills are put into testing security controls and perimeter penetration vulnerabilities in devices. They also…
Are you a database admin looking for ways to make your life easier? There are plenty of effective strategies to…
PSPKIAudit is a PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft…
EDD (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the…
Git-Secret is a go scripts for finding an API key / some keywords in repository. Update V1.0.1 Removing some checkersAdding…
LazySign create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool…
Brutus is an educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Introduction Looking for…
PickleC2 is a simple C2 framework written in python3 used to help the community in Penetration Testers in their red…
tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual…
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware…