CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from…
Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.…
Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple:…
Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises,…
Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP…
ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log…
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation…
Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py…
OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red…
Misp-Extractor is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as…