CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this…
GoSH is a tool that generates a Go binary that launches a shell of the desired type on the targeted…
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application…
PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of…
graphql-threat-matrix was built for bug bounty hunters, security researchers and hackers to assist with uncovering vulnerabilities across multiple GraphQL implementations. The…
Malicious-Pdf Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration testing and/or…
Cliam is a simple cloud permissions identifier. There are two main components to the CLI. Most of the enumerated permissions…
LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beacon data over LDAP using user…
FirmWire is a full-system baseband firmware analysis platform that supports Samsung and MediaTek. It enables fuzzing, root-cause analysis, and debugging…
Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new…