Kali Linux

CVE-Tracker : With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs

CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this…

2 years ago

GoSH : Golang Reverse/Bind Shell Generator

GoSH is a tool that generates a Go binary that launches a shell of the desired type on the targeted…

2 years ago

Email-Prediction-Asterisks : Script That Allows You To Identify The Emails Hidden Behind Asterisks

Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application…

2 years ago

PEzor-Docker : With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!

PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of…

2 years ago

Graphql-Threat-Matrix : GraphQL Threat Framework Used By Security Professionals

graphql-threat-matrix was built for bug bounty hunters, security researchers and hackers to assist with uncovering vulnerabilities across multiple GraphQL implementations. The…

2 years ago

Malicious-Pdf : Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality

Malicious-Pdf Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration testing and/or…

2 years ago

Cliam : Multi Cloud IAM Permissions Enumeration Tool

Cliam is a simple cloud permissions identifier. There are two main components to the CLI. Most of the enumerated permissions…

2 years ago

LDAPFragger : Command And Control Tool That Enables Attackers To Route Cobalt Strike Beacon Data

LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beacon data over LDAP using user…

2 years ago

FirmWire : b Full-System Baseband Firmware Emulation Platform

FirmWire is a full-system baseband firmware analysis platform that supports Samsung and MediaTek. It enables fuzzing, root-cause analysis, and debugging…

2 years ago

LeakedHandlesFinder : Leaked Windows Processes Handles Identification Tool

Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new…

2 years ago