TotP-SSH-Fluxer : Take Security By Obscurity To The Next Level

4 years ago

Totp-Ssh-Fluxer will take Security By Obscurity To The Next Level. Some people change their SSH port on their servers so…

defenselessV1 : Just Another Vulnerable Web Application

4 years ago

defenselessV1 is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of…

TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine

4 years ago

TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using…

ColdFire : Golang Malware Development Library

4 years ago

ColdFire provides various methods useful for malware development in Golang. Most functions are compatible with both Linux and Windows operating…

Neurax : A Framework For Constructing Self-Spreading Binaries

4 years ago

Neurax is a framework that aids in creation of self-spreading software. Requirements go get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator…

Nebula : Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS

4 years ago

Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each…

Bn-Uefi-Helper : Helper Plugin For Analyzing UEFI Firmware

4 years ago

Bn-Uefi-Helper is a tool to helper plugin for analyzing UEFI firmware. This plugin contains the following features: Apply the correct…

Penglab : Abuse Of Google Colab For Cracking Hashes

4 years ago

Penglab is a ready-to-install setup on Google Colab for cracking hashes with an incredible power, really useful for CTFs.  It installs…

RedWarden : Flexible CobaltStrike Malleable Redirector

4 years ago

Red Teaming business has seen several different great ideas on how to combat incident responders and misdirect them while offering resistant C2 redirectors network…

Kaiju : A Binary Analysis Framework Extension For The Ghidra Software Reverse Engineering Suite

4 years ago

CERT Kaiju is a collection of binary analysis tools for Ghidra. This is a Ghidra/Java implementation of some features of the CERT…