Kali Linux

OpenAttack : An Open-Source Package For Textual Adversarial Attack

OpenAttack is an open-source Python-based textual adversarial attack toolkit, which handles the whole process of textual adversarial attacking, including preprocessing…

3 years ago

Lazyrecon : Tool To Automate Your Reconnaissance Process In An Organized Fashion

Lazyrecon is a subdomain discovery tool that finds and resolves valid subdomains then performs SSRF/LFI/SQLi fuzzing, brute-force and port scanning.…

3 years ago

GDir-Thief : Red Team Tool For Exfiltrating The Target Organization’S Google People Directory That You Have Access To, Via Google’s API

GDir-Thief is a Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via…

3 years ago

MacHound : An extension to audit Bloodhound collecting and ingesting of Active Directory relationships on MacOS hosts

MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts.…

3 years ago

FRIDA-DEXDump : Fast Search And Dump Dex On Memory

FRIDA-DEXDump is a tool for Fast Search And Dump Dex On Memory. Features support fuzzy search broken header dex.fix struct…

3 years ago

Scour : AWS Exploitation Framework

Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team…

3 years ago

Backstab : A Tool To Kill Antimalware Protected Processes

Backstab is a tool to Kill Antimalware Protected Processes. Kill EDR Protected Processes Have these local admin credentials but the…

3 years ago

Invoke-DNSteal : Simple And Customizable DNS Data Exfiltrator

Invoke-DNSteal is a Simple & Customizable DNS Data Exfiltrator. This tool helps you to exfiltrate data through DNS protocol over UDP…

3 years ago

Gorsair : Hacks Its Way Into Remote Docker Containers That Expose Their APIs

Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has…

3 years ago

Red-Shadow : Lightspin AWS IAM Vulnerability Scanner

Red-Shadow is a tool for Lightspin AWS IAM Vulnerability Scanner. Scan your AWS IAM Configuration for shadow admins in AWS…

3 years ago