Kali Linux

Redherd Framework : A Collaborative And Serverless Framework For Orchestrating A Geographically Distributed Group Of Assets

Redherd Framework is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of conducting simulating complex offensive…

4 years ago

Whoc : A Container Image That Extracts The Underlying Container Runtime

Whoc is a container image that extracts the underlying container runtime and sends it to a remote server. Poke at…

4 years ago

Whispers : Identify Hardcoded Secrets In Static Structured Text

Whispers is a static code analysis tool designed for parsing various common data formats in search of hardcoded credentials and…

4 years ago

UDP-Hunter : Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols

UDP-Hunter is a UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top…

4 years ago

ThreatBox : A Standard And Controlled Linux Based Attack Platform

ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started…

4 years ago

ThreadBoat : Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application

ThreadBoat is a Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. About I developed this…

4 years ago

Stacs : Static Token And Credential Scanner

Stacs is a YARA powered static credential scanner which supports binary file formats, analysis of nested archives, composable rulesets and ignore lists,…

4 years ago

SillyRAT : A Cross Platform Multifunctional (Windows/Linux/Mac) RAT

SillyRAT is a cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as…

4 years ago

Registry-Recon : Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon

Registry-Recon is a Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon. Description As a red-team practitioner, we are often using…

4 years ago

pwnSpoof : Generates realistic spoofed log files for common web servers with customisable attack scenarios

pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customizable attack scenarios. Every log bundle is…

4 years ago