Dolos Cloak : Automated 802.1x Bypass

5 years ago

Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using…

Dr_Robot : Tool Used To Enumerate The Subdomains Associated With A Company

5 years ago

Dr_Robot is a tool for Domain Reconnaissance and Enumeration. By utilizing containers to reduce the overhead of dealing with dependencies, inconsistency…

FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell & .NET

5 years ago

FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining,…

Aura Botnet : A Super Portable Botnet Framework With A Django-Based C2 Server

5 years ago

Aura Botnet is a super portable botnet framework with a Django-based C2 server. The client is written in C++, with…

Stardox : Github Stargazers Information Gathering Tool

5 years ago

Stardox is an advanced github stargazers information gathering tool. It scraps Github for information and display them in list tree…

Act Platform : Open Platform For Collection & Exchange Of Threat Intelligence Information

5 years ago

Semi-Automated Cyber Threat Intelligence or ACT is a research project led by mnemonic as with contributions from the University of…

PrivExchange : Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

5 years ago

PrivExchange is a tool to Exchange your privileges for Domain Admin privs by abusing Exchange. These tools require impacket. You can…

PostShell – Post Exploitation Bind/Backconnect Shell

5 years ago

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive…

TinkererShell : A Simple Python Reverse Shell

5 years ago

TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just for…

DetExploit : OSS Vulnerability Scanner for Windows Platform

5 years ago

DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.…