RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often…
Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon…
AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability…
Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its…
XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery or SSRF is a type of vulnerability class…
EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.…
Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is…
Clrinject injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can…
The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a…
Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the…