Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator

5 years ago

Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script…

SniperPhish : The Web-Email Spear Phishing Toolkit

5 years ago

SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps…

How to Find a Person on Social Media?

5 years ago

You may use social media to locate or track down anyone you want to touch. People create profiles and accounts…

Tscopy : Tool to parse the NTFS $MFT file to locate and copy specific files

5 years ago

Tscopy is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the filesystem.…

Cook : A Customizable Wordlist And Password Generator

5 years ago

Cook is a customizable wordlist and password generator. Easily create permutations and combinations of words with predefined sets of extensions,…

Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator

5 years ago

Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script…

Profil3r : OSINT Tool That Allows You To Find A Person’S Accounts And Emails + Breached Emails

5 years ago

Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their…

Fav-Up : IP Lookup By Favicon Using Shodan

5 years ago

Fav-Up is a tool used for lookups for real IP starting from the favicon icon and using Shodan. Installation pip3…

Ldsview : Offline search tool for LDAP directory dumps in LDIF format

5 years ago

Ldsview is a offline search tool for LDAP directory dumps in LDIF format. Features Fast and memory efficient parsing of…

Posta : Cross-document Messaging Security Research Tool

5 years ago

Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and includes features such…