R K

Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator

Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script…

5 years ago

SniperPhish : The Web-Email Spear Phishing Toolkit

SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps…

5 years ago

Tscopy : Tool to parse the NTFS $MFT file to locate and copy specific files

Tscopy is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the filesystem.…

5 years ago

Cook : A Customizable Wordlist And Password Generator

Cook is a customizable wordlist and password generator. Easily create permutations and combinations of words with predefined sets of extensions,…

5 years ago

Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator

Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script…

5 years ago

Profil3r : OSINT Tool That Allows You To Find A Person’S Accounts And Emails + Breached Emails

Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their…

5 years ago

Fav-Up : IP Lookup By Favicon Using Shodan

Fav-Up is a tool used for lookups for real IP starting from the favicon icon and using Shodan. Installation pip3…

5 years ago

Ldsview : Offline search tool for LDAP directory dumps in LDIF format

Ldsview is a offline search tool for LDAP directory dumps in LDIF format. Features Fast and memory efficient parsing of…

5 years ago

Posta : Cross-document Messaging Security Research Tool

Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and includes features such…

5 years ago

OverRide : Binary Exploitation And Reverse-Engineering

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you…

5 years ago