Kali Linux

Lunar : A Lightweight Native DLL Mapping Library

Lunar is a lightweight native DLL mapping library that supports mapping directly from memory. Features Imports and delay imports are…

6 years ago

Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land…

6 years ago

Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts

Eavesarp a reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is…

6 years ago

Richkit : Domain Enrichment Toolkit

Richkit is a python3 package that provides tools taking a domain name as input, and returns additional information on that…

6 years ago

Chromepass : Hacking Chrome Saved Passwords

Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved paswordsSend a…

6 years ago

Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It…

6 years ago

Tails – Live System To Preserve Your Privacy & Anonymity

The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot. This release also…

6 years ago

MSOLSpray : A Password Spraying Tool For Microsoft Online Accounts

MSOLSpray is a password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid,…

6 years ago

Git-Hound : PinPoints Exposed API Keys On GitHub Using Pattern Matching

A batch-catching, pattern-matching, patch-attacking secret snatcher. GitHound pinpoints exposed API keys on GitHub using pattern matching, commit history searching, and…

6 years ago

DNSteal : DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests

DNSteal is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.…

6 years ago