Ghostbuster obtains all the DNS records present in all of your AWS accounts (Route53), and can optionally take in records…
The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing…
Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…
S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…
Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of…
PurplePanda is a tool that fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths…
RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the…
WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral…
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for…
Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering,…