SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For...
SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. Google dorking is a...
CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And...
CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS...
Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade...
Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.
Note:
...
Tracgram : Use Instagram location features to track an account
Trackgram Use Instagram location features to track an account.
Usage
At this moment the usage of Trackgram is extremly simple:
1. Download this repository
2. Go through the...
Probable_Subdomains : Subdomains Analysis And Generation Tool
Probable_Subdomains is a Subdomains Analysis And Generation Tool
Online tool: https://weakpass.com/generate/domains
TL;DR
During bug bounties, penetrations tests, red teams exercises, and other great activities, there is...
Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup
Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup.
Written in Python 3.
What is Reverse IP?
Reverse IP refers to the process of looking...
ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA
ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the...
Faraday : Open Source Vulnerability Management Platform
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you...
Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!
Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques!
POC video:
https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael
Installation:
pip3 install -r requirements.txt
Usage: upload_bypass.py
Options: -h, --help
show this help message and...
OffensivePipeline : To Download And Build C# Tools, To Improve Their Evasion For Red...
OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use...