Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via...
Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has...
Awesome-Password-Cracking :A Curated List Of Awesome Tools, Research, Papers And Other Projects
Awesome-Password-Cracking is a curated list of awesome tools, research, papers and other projects related to password cracking and password security.
Read the guidelines before contributing! In short:
List...
Autodeauth : A Tool Built To Automatically Deauth Local Networks
Autodeauth is a tool built to automatically deauth local networks
Tested on Raspberry Pi OS and Kali Linux
Setup
$ chmod +x setup.sh$ sudo ./setup.sh This...
Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator
Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that...
Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically
Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the...
ReconPal : Leveraging NLP For Infosec
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs...
System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources,...
System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars...
dBmonster : Track WiFi Devices With Their Recieved Signal Strength
dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their sent packets (sniffed with TShark)....
Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques
Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here you will find explanations...
RPCMon : RPC Monitor Tool Based On Event Tracing For Windows
RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like Procmon for easy usage,...