Delta – SDN Security Evaluation & Penetration Testing Framework

6 years ago

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the…

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

6 years ago

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on…

Onion nmap To Scan Hidden Onion Services

6 years ago

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to…

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

6 years ago

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

6 years ago

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…

Curate – A tool for fetching archived URLs

6 years ago

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

6 years ago

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…

Tcpflow – To Monitor, Capture & Dump Packets

6 years ago

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…

Mallet – A Framework For Creating Proxies

6 years ago

Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just…

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts

6 years ago

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This…