Rootless Jailbreakd – Jailbreakd Offering Some More Functionality To The Jailbreak

7 years ago

Rootless Jailbreakd is A small jailbreakd offering some more functionality to the jailbreak. Uses CPDisctributedMessageCenter. To compile you need theos…

Frisky – Tools To Assist Binary App Reversing & Augmentation

7 years ago

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if…

Dejavu – Open Source Deception Framework

7 years ago

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve…

Delta – SDN Security Evaluation & Penetration Testing Framework

7 years ago

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the…

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

7 years ago

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on…

Onion nmap To Scan Hidden Onion Services

7 years ago

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to…

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

7 years ago

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

7 years ago

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…

Curate – A tool for fetching archived URLs

7 years ago

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

7 years ago

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…