BLUESPAWN : Windows-Based Active Defense & EDR Tool To Empower Blue Teams

6 years ago

BLUESPAWN helps blue teams monitor Windows systems in real-time against active attackers by detecting anomalous activity. We've created and open-sourced…

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

6 years ago

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases…

PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables & Parameters

6 years ago

PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3. Usage PyFuscation.py [-h] [-f]…

Btlejack : Bluetooth Low Energy Swiss-Army Knife

6 years ago

Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC…

mpDNS : Multi-Purpose DNS Server 2019

6 years ago

mpDNS aka multi-purpose DNS server is a simple, configurable "clone & run" DNS server with multiple useful features. Should work…

Ehtools : Penetration Tools That Can Be Explored Easily

6 years ago

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration…

Wordlister : A Simple Wordlist Generator & Mangler Written In Python

6 years ago

Wordlister is a simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order…

Barq: The AWS Cloud Post Exploitation Framework

6 years ago

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you…

Telegra Csharp C2 : Command and Control for C# Writing

6 years ago

Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy…

Http Request Smuggler : Extension For Burp Suite

6 years ago

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggler attacks, originally created during HTTP Desync Attacks research. It…