RdpCacheStitcher : RdpCacheStitcher Is A Tool That Supports Forensic Analysts

4 years ago

RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP cache…

FalconEye : Real-time detection software for Windows process injections

4 years ago

FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch…

Rustcat : Netcat Alternative

4 years ago

Rustcat is a port listener that can be used for different purposes.It is basically like netcat but with fewer options.…

Joern : Open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs

4 years ago

Joern is an open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs. Quick Installation wget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x ./joern-install.shsudo…

PPLdump : Dump The Memory Of A PPL With A Userland Exploit

4 years ago

PPLdump implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post - for dumping the memory of any…

Aggrokatz : An Aggressor Plugin Extension For Cobalt Strike Which Enables Pypykatz To Interface With The Beacons Remotely

4 years ago

aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely.The current version of aggrokatz allows pypykatz to parse LSASS dump files and…

Volatility GUI : GUI For Volatility Forensics Tool

4 years ago

This is a GUI for Volatility forensics tool written in PyQT5. Prerequisites 1- Installed version of Volatility. 2- Install PyQT5.…

Gundog : Guided Hunting In Microsoft 365 Defender

4 years ago

gundog - PowerShell based guided hunting in Microsoft 365 Defender Gundog provides you with guided hunting in Microsoft 365 Defender.…

Redpill : Assist Reverse Tcp Shells In Post-Exploration Tasks

4 years ago

Redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements weneed to use unconventional ways…

iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For iOS Applications

4 years ago

iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the…