Kali Linux

Rustcat : Netcat Alternative

Rustcat is a port listener that can be used for different purposes.It is basically like netcat but with fewer options.…

4 years ago

Joern : Open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs

Joern is an open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs. Quick Installation wget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x ./joern-install.shsudo…

4 years ago

PPLdump : Dump The Memory Of A PPL With A Userland Exploit

PPLdump implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post - for dumping the memory of any…

4 years ago

Aggrokatz : An Aggressor Plugin Extension For Cobalt Strike Which Enables Pypykatz To Interface With The Beacons Remotely

aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely.The current version of aggrokatz allows pypykatz to parse LSASS dump files and…

4 years ago

Volatility GUI : GUI For Volatility Forensics Tool

This is a GUI for Volatility forensics tool written in PyQT5. Prerequisites 1- Installed version of Volatility. 2- Install PyQT5.…

4 years ago

Gundog : Guided Hunting In Microsoft 365 Defender

gundog - PowerShell based guided hunting in Microsoft 365 Defender Gundog provides you with guided hunting in Microsoft 365 Defender.…

4 years ago

Redpill : Assist Reverse Tcp Shells In Post-Exploration Tasks

Redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements weneed to use unconventional ways…

4 years ago

iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For iOS Applications

iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the…

4 years ago

Interactsh : An OOB Interaction Gathering Server And Client Library

Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external interactions,…

4 years ago

A2P2V : Automated Attack Path Planning and Validation

A2P2V ( Automated Attack Path Planning and Validation) is a planning and cyber-attack tool that provides the capability for users…

4 years ago