Evil SSDP responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear…
Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it does…
NTLMRecon is built with flexibilty in mind. A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find…
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides…
Http asynchronous reverse shell is a tool used for asynchronous reverse shell using the HTTP protocol. Why ? Today there…
Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for…
SharpRDP is a Remote Desktop Protocol Console Application for Authenticated Command Execution. Building To compile open the project in Visual…
Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. It…
The main code of Raspberry Pi Imager Imaging Utility is made available under the terms of the Apache license. See…
Extended XSS Searcher is the is the extended version based on the initial idea already published as "xssfinder". This private…