WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

6 years ago

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

6 years ago

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…

Curate – A tool for fetching archived URLs

6 years ago

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

6 years ago

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…

Tcpflow – To Monitor, Capture & Dump Packets

6 years ago

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…

Mallet – A Framework For Creating Proxies

6 years ago

Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just…

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts

6 years ago

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This…

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks

6 years ago

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions…

PacVim – A Game That Teaches You Vim Commands

6 years ago

PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner.  In…

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

6 years ago

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can…