PingCastle : Get Active Directory Security At 80% In 20% Of The Time

6 years ago

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment…

Mondoo : Native Security & Vulnerability Risk Management

6 years ago

Mondoo Cloud is a native security & vulnerability risk management. Quick Start Installing Workstation export MONDOO_REGISTRATION_TOKEN='changeme' curl -sSL http://mondoo.io/download.sh |…

BLUESPAWN : Windows-Based Active Defense & EDR Tool To Empower Blue Teams

6 years ago

BLUESPAWN helps blue teams monitor Windows systems in real-time against active attackers by detecting anomalous activity. We've created and open-sourced…

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

6 years ago

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases…

PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables & Parameters

6 years ago

PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3. Usage PyFuscation.py [-h] [-f]…

Btlejack : Bluetooth Low Energy Swiss-Army Knife

6 years ago

Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC…

mpDNS : Multi-Purpose DNS Server 2019

6 years ago

mpDNS aka multi-purpose DNS server is a simple, configurable "clone & run" DNS server with multiple useful features. Should work…

Ehtools : Penetration Tools That Can Be Explored Easily

6 years ago

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration…

Wordlister : A Simple Wordlist Generator & Mangler Written In Python

6 years ago

Wordlister is a simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order…

Barq: The AWS Cloud Post Exploitation Framework

6 years ago

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you…