Kali Linux

Oh365UserFinder : Python3 O365 User Enumeration Tool

Oh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses…

3 years ago

PSRansom : PowerShell Ransomware Simulator With C2 Server

PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware…

3 years ago

S3Sec : Check AWS S3 Instances For Read/Write/Delete Access

S3Sec tool was developed to quickly test a list of s3 buckets for public read, write and delete access for…

3 years ago

Nuclei-Burp-Plugin : Nuclei Plugin For BurpSuite

Nuclei-Burp-Plugin is a BurpSuite plugin intended to help with nuclei template generation. Features Template matcher generation Word and Binary matcher creation using selected response snippets from Proxy history or Repeater contextsMulti-line…

3 years ago

Ghostbuster : Eliminate Dangling Elastic IPs By Performing Analysis On Your Resources

Ghostbuster obtains all the DNS records present in all of your AWS accounts (Route53), and can optionally take in records…

3 years ago

Kali Linux – The Best Tool For Penetration Testing?

The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing…

3 years ago

Epagneul : Graph Visualization For Windows Event Logs

Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…

3 years ago

S1EM : This Project Is A SIEM With SIRP And Threat Intel, All In One

S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…

3 years ago

Mip22 : An Advanced Phishing Tool

Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of…

3 years ago

PurplePanda : Identify Privilege Escalation Paths Within And Across Different Clouds

PurplePanda is a tool that fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths…

3 years ago