RemoteRecon – Remote Recon and Collection

6 years ago

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often…

ReconDog – Reconnaissance Swiss Army Knife

6 years ago

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon…

AutoRDPwn – The Shadow Attack Framework

6 years ago

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability…

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

6 years ago

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its…

XXRF Shots – Useful For Testing SSRF Vulnerability

6 years ago

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class…

EKFiddle – A framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising & Malicious Traffic In General

6 years ago

EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.…

DigiDuck – Framework for Digiduck Development Boards Running ATTiny85 Processors & Micronucleus Bootloader

6 years ago

Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is…

Clrinject – Injects C# EXE or DLL Assembly Into every CLR Runtime and AppDomain Of Another Process

6 years ago

Clrinject injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can…

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware Bugs

6 years ago

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a…

Docker Tor Hidden Service Nginx – Easily Setup A Hidden Service Inside The Tor Network

6 years ago

Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the…