Pinecone : A WLAN Red Team Framework

0
Pinecone is a WLAN networks auditing tool, suitable for red team usage. It is extensible via modules, and it is designed to be run...

Koh : The Token Stealer

0
Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via purposeful token/logon session leakage. Some...

Zenbuster : Multi-threaded URL Enumeration/Brute-Forcing Tool

0
ZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as a way to deepen my familiarity...

Kubeaudit : Tool To Audit Your Kubernetes Clusters Against Common Security Controls

0
Kubeaudit no longer supports APIs deprecated as of Kubernetes v.1.16 release. So, it is now a requirement for clusters to run Kubernetes >=1.16 kubeaudit is a command...

Dumpscan : Tool To Extract And Dump Secrets From Kernel And Windows Minidump Formats

0
Dumpscan is a command-line tool designed to extract and dump secrets from kernel and Windows Minidump formats. Kernel-dump parsing is provided by volatility3. Features x509 Public and Private...

Trufflehog : Find Credentials All Over The Place

0
TruffleHog v3 is a complete rewrite in Go with many new powerful features. We've added over 700 credential detectors that support active verification against their respective...

Bypass-Url-Parser : Tool That Tests Many URL Bypasses To Reach A 40X Protected Page

0
Bypass-Url-Parser is a Tool that tests MANY url bypasses to reach a 40X protected page. If you wonder why this code is nothing but a dirty curl wrapper, here's...

WebView2-Cookie-Stealer : Attacking With WebView2 Applications

0
WebView2-Cookie-Stealer, According to Microsoft, “Microsoft Edge WebView2 control allows you to embed web technologies (HTML, CSS, and JavaScript) in your native apps”. Essentially, WebView2...

Tofu : Windows Offline Filesystem Hacking Tool For Linux

0
Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more. How It Works...

Frostbyte : FrostByte Is A POC Project That Combines Different Defense Evasion Techniques

0
FrostByte Is A POC Project That Combines Different Defense Evasion Techniques. In the past few days I've been experimenting with the AppDomain manager injection technique had...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...