Kali Linux

Etherblob Explorer : Search And Extract Blob Files On The Ethereum Blockchain Network

EtherBlob Explorer is a tool intended for researchers, analysts, CTF players or anyone curious enough wanting to search for different…

4 years ago

IPED : Digital Forensic Tool – Process And Analyze Digital Evidence

IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime…

4 years ago

Ghidra-Evm : Module For Reverse Engineering Smart Contracts

Ghidra-Evm in the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a…

4 years ago

Msldap : LDAP Library For Auditing MS AD

Msldap is a tool for (LDAP) LightWeight Directory Acess Protocol library for MS AD. Features Comes with a built-in console…

4 years ago

Mediator : An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture

Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a "mediator" server that…

4 years ago

Corsair_Scan : A Security Tool To Test Cross-Origin Resource Sharing (CORS)

Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources…

4 years ago

Eyeballer : Convolutional Neural Network For Analyzing Pentest Screenshots

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of…

4 years ago

DFIR-O365RC : PowerShell Module For Office 365 And Azure AD Log Collection

The DFIR-O365RC PowerShell module is a set of functions that allow the DFIR analyst to collect logs relevant for Office…

4 years ago

Red-Kube : Red Team K8S Adversary Emulation Based On Kubectl

Red-Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's perspective.…

4 years ago

CIMplant : C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems

C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or…

4 years ago