PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching…
SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…
UBoat is a POC HTTP Botnet designed to replicate a full weaponised commercial botnet. What is a Botnet ? When…
ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and…
LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation. Connection Set your IP…
POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable…
XORpass is an encoder to bypass WAF filters using XOR operations. Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $…
CloudUnflare is a tool used to reconnaissance Real IP address for Cloudflare Bypass. Preparation: 1. CompleteDNS API Create an account…
CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms,…
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through…