Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes. Background .NET is a very…
Process Overwriting is a PE injection technique, closely related to Process Hollowing and Module Overloading Process Hollowing (aka RunPE) is an old and…
Heyserial will Programmatically create hunting rules for deserialization exploitation with multiple keywords (e.g. cmd.exe)gadget chains (e.g. CommonsCollection)object types (e.g. ViewState,…
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and…
SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD…
AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the help of Carbon…
Spring4Shell-POC is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is…
CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this…
GoSH is a tool that generates a Go binary that launches a shell of the desired type on the targeted…
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application…