AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon

5 years ago

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on…

SNOWCRASH : A Polyglot Payload Generator

5 years ago

SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in…

PoisonApple : macOS Persistence Tool

5 years ago

PoisonApple is a command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used…

Max : Maximizing BloodHound With A Simple Suite Of Tools

5 years ago

Description New Release:dpat - The BloodHound Domain Password Audit Tool (DPAT)A simple suite of tools:get-info - Pull lists of information…

NtHiM : Super Fast Sub-domain Takeover Detection

5 years ago

NtHiM is a super Fast Sub-domain Takeover Detection. Installation Method 1: Using Pre-compiled Binaries The pre-compiled binaries for different systems…

Columbo : A Computer Forensic Analysis Tool Used To Simplify & Identify Specific Patterns In Compromised Datasets

5 years ago

Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down…

Burpsuite : Copy As XMLHttpRequest Extension

5 years ago

The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies…

Scylla : The Simplistic Information Gathering Engine

5 years ago

Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts,…

UAC : Unix-like Artifacts Collector

5 years ago

UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection…

Ethical Hacking – A new evolution in the digital era

5 years ago

Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network.…