Kali Linux

Best Linux Distro For Students

Many developers and programmers use Linux as their operating system of choice. Most professional developers choose to utilize it for…

4 years ago

CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS…

4 years ago

LoGiC.NET : A More Advanced Free And Open .NET Obfuscator Using Dnlib

LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works…

4 years ago

Dorothy : Tool To Test Security Monitoring And Detection For Okta Environments

Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has…

4 years ago

Reconmap : VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform

Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security…

4 years ago

TokenTactics : Azure JWT Token Manipulation Toolset

TokenTactics is a Azure JSON Web Token ("JWT") Manipulation Toolset. Azure access tokens allow you to authenticate to certain endpoints…

4 years ago

Juumla : Tool Designed To Identify And Scan For Version, Config Files In The CMS Joomla!

Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Installing /…

4 years ago

Rconn : Rconn Is A Multiplatform Program For Creating Generic Reverse Connections

Rconn (r[everse] conn[ection]) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT…

4 years ago

Ppmap : A Scanner/Exploitation Tool Written In GO, Which Leverages Prototype Pollution To XSS By Exploiting Known Gadgets

Ppmap is a simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables…

4 years ago

MANSPIDER : Spider Entire Networks For Juicy Files Sitting On SMB Shares. Search Filenames Or File Content – Regex Supported!

MANSPIDER will crawl every share on every target system. If provided creds don't work, it will fall back to "guest",…

4 years ago