ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log…
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation…
Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py…
OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red…
Misp-Extractor is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as…
Invoke-Transfer is a PowerShell Clipboard Data Transfer. This tool helps you to send files in highly restricted environments such as…
Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests…
Email Vulnerablity Checker v1.1.1 verifies whether the domain is vulnerable to spoofing by Email-vulnerablity-checker Features This tool will automatically tells…
DNSRecon is a DNS scanning and enumeration tool written in Python, which allows you to perform different tasks, such as…
Powershell-Backdoor-Generator is a reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature…