Kali Linux

BeatRev : POC For Frustrating/Defeating Malware Analysts

BeatRev is a POC For Frustrating/Defeating Malware Analysts. The first time the malware runs on a victim it AES encrypts…

2 years ago

ApacheTomcatScanner : A Python Script To Scan For Apache Tomcat Server Vulnerabilities

ApacheTomcatScanner is a python script to scan for Apache Tomcat server vulnerabilities. Features  Multithreaded workers to search for Apache tomcat…

2 years ago

Aced : Tool to parse and resolve a single targeted Active Directory principal’s DACL

Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound…

2 years ago

Erlik : Vulnerable Soap Service

Erlik is a vulnerable SOAP web service. It is a lab environment created for people who want to improve themselves…

2 years ago

Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS

Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A…

2 years ago

Awesome-Password-Cracking :A Curated List Of Awesome Tools, Research, Papers And Other Projects

Awesome-Password-Cracking is a curated list of awesome tools, research, papers and other projects related to password cracking and password security.…

2 years ago

Autodeauth : A Tool Built To Automatically Deauth Local Networks

Autodeauth is a tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $…

2 years ago

Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator

Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of…

2 years ago

Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The…

2 years ago

ReconPal : Leveraging NLP For Infosec

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to…

2 years ago