Subcert : Finds All The Subdomains From Certificate Transparency Logs

4 years ago

Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Setup Step 1: Install…

Mole : A Framework For Identifying & Exploiting Out-Of-Band Application Vulnerabilities

4 years ago

Mole is a framework for identifying and exploiting out-of-band (OOB) vulnerabilities. Installation & Setup Mole Install Python >= 3.6 virtualenv…

Invoke SocksProxy : Socks Proxy & Reverse Socks Server Using Powershell

4 years ago

Invoke SocksProxy is a tool that creates a local or "reverse" Socks proxy using powershell. The local proxy is a…

Reverse Shell Generator : Hosted Reverse Shell Generator With A Ton Of Functionality

4 years ago

Hosted Reverse Shell generator with a ton of functionality. Features Generate common listeners and reverse shellsRaw mode to cURL shells…

OffensivePipeline : Tool To Download, Compile & Obfuscate C# Tools For Red Team Exercises

4 years ago

OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises. It downloads the tool…

Diceware Password Generator : Generate High Entropy Passwords

4 years ago

Diceware is a method used to generate cryptographically strong memorable passphrases. This is a python implementation of the diceware password…

Darkdump : Search The Deep Web Straight From Your Terminal

4 years ago

Darkdump is a simple script written in Python3.9 in which it allows users to enter a search term (query) in…

Rafel Rat : Android Rat Written In Java

4 years ago

Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features. Main Features Admin PermissionAdd App…

AnonX : An Encrypted File Transfer Via AES-256-CBC

4 years ago

AnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one week and shall remove from the…

Strafer : A Tool To Detect Potential Infections In Elasticsearch Instances

4 years ago

Elasticsearch infections are rising exponentially. The adversaries are exploiting open and exposed Elasticsearch interfaces to trigger infections in the cloud…