Kali Linux

Macrome : Excel Macro Document Reader/Writer For Red Teamers And Analysts

Macrome an Excel Macro Document Reader/Writer for Red Teamers & Analysts. Blog posts describing what this tool actually does can…

2 years ago

FakeLogonScreen : Fake Windows Logon Screen To Steal Passwords

FakeLogonScreen is a utility to fake the Windows logon screen in order to obtain the user's password. The password entered…

2 years ago

Shellcodetester : An Application To Test Windows And Linux Shellcodes

Shellcodetester is a tool that tests generated ShellCodes. Usage Example ShellCode Tester Linux Installation git clone https://github.com/helviojunior/shellcodetester.git cd shellcodetester/Linux make…

2 years ago

Flare-Qdb : Command-line And Python Debugger For Instrumenting And Modifying Native Software

Flare-qdb is a command-line and scriptable Python-based tool for evaluating and manipulating native program state. It uses Vivisect to set a breakpoint…

2 years ago

Autotimeliner : Automagically Extract Forensic Timeline From Volatile Memory Dump

Autotimeliner tool will automagically extract forensic timeline from volatile memory dumps. Requirements Python 3Volatilitymactime (from SleuthKit) (Developed and tested on…

2 years ago

Droopescan : A Plugin-Based Scanner That Aids Security Researchers

Droopescan is a plugin-based scanner that aids security researchers in identifying issues with several CMS. Usage of droopescan for attacking…

2 years ago

Exrop : Automatic ROP Chain Generation

Exrop is automatic ROP chains generator tool which can build gadget chain automatically from given binary and constraints Requirements : Triton, ROPGadget…

2 years ago

truffleHog : Searches Through Git Repositories For High Entropy Strings And Secrets

truffleHog previously functioned by running entropy checks on git diffs. This functionality still exists, but high signal regex checks have…

2 years ago

Get-RBCD-Threaded : Tool To Discover Resource-Based Constrained Delegation Attack Paths

Get-RBCD-Threaded is a tool to discover Resource-Based Constrained Delegation attack paths in Active Directory Environments Based almost entirely on wonderful…

2 years ago

Cloudsploit : Cloud Security Posture Management (CSPM)

CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon…

2 years ago