Frisky – Tools To Assist Binary App Reversing & Augmentation
Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...
Dejavu – Open Source Deception Framework
DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...
Delta – SDN Security Evaluation & Penetration Testing Framework
DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown...
Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory
A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
Onion nmap To Scan Hidden Onion Services
Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...
WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation
WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Hawkeye – A Tool To Crawl The Filesystem Or A Directory
HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password...
Curate – A tool for fetching archived URLs
Curate is a tool for fetching archived URLs and to be rewritten in Go.
Curate Initial set-up one-liner
This will clone this repository and then move...
Mallet – A Framework For Creating Proxies
Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just more generic.
It is built...
RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts
RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...