Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation
Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments.
Amnesiac is being developed to bridge a gap on Windows OS,...
Mantis: The Comprehensive Command-Line Framework for Asset Discovery and Security Scanning
Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then...
Free Threat Intel/IOC Feeds: Maximizing Cybersecurity Efficacy with Open-Source Intelligence Integration
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. The CSV ThreatIntelFeeds is stored in a structured manner...
Hayabusa: Revolutionizing Windows Event Log Analysis with Rapid Forensics and Advanced Threat Hunting Capabilities
Hayabusa is a Windows event log fast forensics timeline generator and threat hunting tool created by the Yamato Security group in Japan. Hayabusa means "peregrine falcon" in Japanese and was chosen as...
EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing...
It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are essential for business communication....
IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing
IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate privileges or move laterally...
Commix: The Command Injection Exploiter for Penetration Testing
It stands for "comm and injection exploiter." Commix is a state-of-the-art open-source tool made for penetration testers and other cybersecurity experts. Anastasios Stasinopoulos made...
Active Directory Canaries: Advanced Detection and Prevention of AD Enumeration
Active Directory Canaries is a detection primitive for Active Directory enumeration (or recon) techniques. It abuses the concept of DACL Backdoors, introduced by Specter...
FACTION PenTesting Report Generation and Collaboration Engine
In the world of cybersecurity, where things change quickly, it's important to do thorough and fast penetration testing. Here comes FACTION, a cutting-edge Penetration...
XnLinkFinder v4.1 – A Comprehensive Guide To Discovering Endpoints And Parameters
This is a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:
crawling a target (pass a...