PoshC2 : Python Server for PoshC2

6 years ago

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and…

Hacktronian : All in One Hacking Tool for Linux & Android

6 years ago

Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. Menu…

Pyshark : Python Wrapper For TShark, Allowing Python Packet Parsing Using Wireshark Dissectors

6 years ago

Python wrapper for tshark, allowing python packet parsing using wireshark dissectors. Python2 deprecation - This package no longer supports Python2.…

Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

6 years ago

Hello! Welcome to applepie! This is a tool designed for fuzzing, introspection, and finding bugs! This is a hypervisor using…

PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable

6 years ago

PEpper is an open source tool to perform malware static analysis on Portable Executable. Following are some of the features supported by the tool;…

GoDoH : A DNS-Over-HTTPS C2

6 years ago

GoDoH is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium.…

Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security Issues Outside The Source Code

6 years ago

Truegaze is a static analysis tool for Android and iOS applications focusing on security issues outside the source code such…

PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

6 years ago

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the…

Eyeballer : Convolutional Neural Network For Analyzing Pentest

6 years ago

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of…

A List Of Services & How To Claim Subdomain With Dangling DNS Records

6 years ago

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has…