Rathole, like frp and ngrok, can help to expose the service on the device behind the NAT to the Internet, via a server…
RecoverPy searches through every block of your partition to find your request. You can already find plenty of solutions to…
Bluffy is a utility which was used in experiments to bypass Anti-Virus products (statically) by formatting shellcode into realistic looking…
Kerbrute is a script to perform kerberos bruteforcing by using the Impacket library. When is executed, as input it receives…
CRT is a tool to queries the following configurations in the Azure AD/O365 tenant which can shed light on hard-to-find…
Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis of source…
Gh-Dork is a Github Dorking Tool. Supply a list of dorks and, optionally, one of the following: a user (-u)a…
BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py and autobloody.py. This framework supports…
Ninjas workout is a Vulnerable NodeJS Web Application. Quick Start Download the Repo =>run npm i After Installing all dependency just run…
FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or…