UBoat : HTTP Botnet Project

6 years ago

UBoat is a POC HTTP Botnet designed to replicate a full weaponised commercial botnet. What is a Botnet ? When…

ThreatIngestor : Extract & Aggregate Threat Intelligence

6 years ago

ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and…

LinPwn : Interactive Post Exploitation Tool

6 years ago

LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation. Connection Set your IP…

Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

6 years ago

POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable…

XORpass : Encoder To Bypass WAF Filters Using XOR Operations

6 years ago

XORpass is an encoder to bypass WAF filters using XOR operations. Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $…

CloudUnflare : Reconnaissance Real IP Address for Cloudflare Bypass

6 years ago

CloudUnflare is a tool used to reconnaissance Real IP address for Cloudflare Bypass. Preparation: 1. CompleteDNS API Create an account…

Cryptovenom : The Cryptography Swiss Army Knife

6 years ago

CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms,…

AutoSploit : Automated Mass Exploiter

6 years ago

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through…

ATTACKdatamap : A Datasource Assessment On An Event Level To Show Potential Coverage

6 years ago

ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the "MITRE ATT&CK" framework. This tool…

JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

6 years ago

A ready to use JSONP endpoints to help bypass content security policy of different websites. The tool was presented during…