Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if…
DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve…
DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the…
A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on…
Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to…
WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…
HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…
Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…