WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…
HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…
Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…
Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just…
RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This…
PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions…
PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner. In…
Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can…