Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions…
Ligolo-Ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection without the need of SOCKS. Features Tun…
MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future). Requirements to…
Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview…
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It…
Pantagrule is a series of rules for the hashcat password cracker generated from large amounts of real-world password compromise data. While Pantagrule…
Ctf-Screenshotter is a CTF web challenge about making screenshots. It is inspired by a bug found in real life. The…
BeaconEye scans running processes for active Cobalt Strike beacons. When processes are found to be running beacon, BeaconEye will monitor…
Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in…
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels…