Kali Linux

D4TA-HUNTER : GUI OSINT Framework With Kali Linux

D4TA-HUNTER is a tool created in order to automate the collection of information about the employees of a company that…

2 years ago

Pycrypt : Python Based Crypter That Can Bypass Any Antivirus Products

Pycrypt is a python-based Crypter that can bypass any antivirus product. Antivirus software are protecting computers from malicious software including…

2 years ago

EvilTree : A Remake Of The Classic “Tree” Command

EvilTree is a standalone python3 remake of the classic "tree" command with the additional feature of searching for user provided…

2 years ago

Kubeeye : Tool To Find Various Problems On Kubernetes

KubeEye is an inspection tool for Kubernetes. It discovers whether Kubernetes resources (by using OPA ), cluster components, cluster nodes…

2 years ago

MSMAP : Memory WebShell Generator

Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients.…

2 years ago

SharpSCCM : A C# Utility For Interacting With SCCM

SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and…

2 years ago

Octopii : An AI-powered Personal Identifiable Information (PII) Scanner

Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs,…

2 years ago

Scrcpy : Display And Control Your Android Device

Scrcpy application provides display and control of Android devices connected via USB or over TCP/IP. It does not require any…

2 years ago

Ox4Shell : Deobfuscate Log4Shell Payloads With Ease

Ox4Shell is a tool for deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many…

2 years ago

Stegowiper : A Powerful And Flexible Tool To Apply Active Attacks For Disrupting Stegomalware

Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all…

2 years ago