FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell & .NET

5 years ago

FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining,…

Aura Botnet : A Super Portable Botnet Framework With A Django-Based C2 Server

5 years ago

Aura Botnet is a super portable botnet framework with a Django-based C2 server. The client is written in C++, with…

Stardox : Github Stargazers Information Gathering Tool

5 years ago

Stardox is an advanced github stargazers information gathering tool. It scraps Github for information and display them in list tree…

Act Platform : Open Platform For Collection & Exchange Of Threat Intelligence Information

5 years ago

Semi-Automated Cyber Threat Intelligence or ACT is a research project led by mnemonic as with contributions from the University of…

PrivExchange : Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

5 years ago

PrivExchange is a tool to Exchange your privileges for Domain Admin privs by abusing Exchange. These tools require impacket. You can…

PostShell – Post Exploitation Bind/Backconnect Shell

5 years ago

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive…

TinkererShell : A Simple Python Reverse Shell

5 years ago

TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just for…

DetExploit : OSS Vulnerability Scanner for Windows Platform

5 years ago

DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.…

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

5 years ago

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image. It is a simple…

Cloud-Based Anti-Phishing Tools Can Help Prevent Phishing Attempts By Cybercriminals

5 years ago

Phishing has, is, and will always remain a threat. The most advanced cloud-based anti-phishing tools are there to help you…