Kali Linux

GitOops : All Paths Lead To Clouds

GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by…

4 years ago

BruteLoops : Protocol Agnostic Online Password Guessing API

BruteLoops is a dead simple library providing the foundational logic for efficient password brute force attacks against authentication interfaces. See…

4 years ago

FUSE : A Penetration Testing Tool For Finding File Upload Bugs

FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing…

4 years ago

LinuxCatScale : Incident Response Collection And Processing Scripts With Automated Reporting Scripts

Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based…

4 years ago

Azur3Alph4 : A PowerShell Module That Automates Red-Team Tasks For Ops On Objective

Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE…

4 years ago

ForgeCert : “Golden” Certificates

ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for arbitrary users…

4 years ago

Rdesktop : Open Source Client for Microsoft’s RDP protocol

Rdesktop is an open source client for Microsoft's RDP protocol. It is known to work with Windows versions ranging from…

4 years ago

Xmap : A Fast Network Scanner Designed For Performing Internet-wide IPv6 &Amp; IPv4 Network Research Scanning

XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and…

4 years ago

PowerShx : Run Powershell Without Software Restrictions

PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run…

4 years ago

Viper : Intranet Pentesting Tool With Webui

Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process…

4 years ago