GCPwn – A Comprehensive Tool For GCP Security Testing

gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists of numerous enumeration modules I wrote plus exploit modules leveraging research done by others in the space (ex. Rhino Security) along with some existing known standalone tools like GCPBucketBrute in an effort to make the …

Unbekannt Framework – The Comprehensive Hacking And Pentesting Suite For Windows

The Linux version is no longer supported! The last Linux version is 6.0 that you find inside this repository. The reason for this is that the Unbekannt Framework originally existed for Windows and Linux only supports a few features. Thats why I decided not to release new versions for Linux anymore. It is strongly recommended …

MNSAllTools – The Ultimate Collection Of 350+ Hacking Resources For Cybersecurity Professionals

A collection of 350+ hacking tools you can install into termux for hacking, Pentesting, Mapping and more. In this tool you will get a total of 350+ hacking tools for you to install into termux/kali/windows/ubuntu, Suitable for pentesters, bug hunting, exploitation, mapping, etc. You can install these tools by just typing the number it falls …

X-hackz : Your Gateway To Advanced Hacking Tools

“X-hackz” is a multifaceted toolkit designed for hacking enthusiasts and cybersecurity learners. It offers a range of functions from social media and camera hacking to WhatsApp viruses and SMS bombing. This guide provides detailed steps for installation and usage, emphasizing that X-hackz is intended solely for educational purposes. Discover how to harness these tools effectively …

Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing

Host discovery and service enumeration are part of every network pentest and routine check. It’s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time. Zero-E (ZrE) aims to automate the entire process in a fire-and-forget …

Akto.io API Security : A Comprehensive Guide To Empowering Security Teams

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers coverage for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, …

ESP32 Wi-Fi Penetration Tool : A Comprehensive Guide To Advanced Wi-Fi Penetration Testing

This project introduces an universal tool for ESP32 platform for implementing various Wi-Fi attacks. It provides some common functionality that is commonly used in Wi-Fi attacks and makes implementing new attacks a bit simpler. It also includes Wi-Fi attacks itself like capturing PMKIDs from handshakes, or handshakes themselves by different methods like starting rogue duplicated …

RustRedOps – Advanced Red Team Tooling And Techniques In Rust

“RustRedOps” stands as a groundbreaking repository, pioneering the development of sophisticated Red Team tools and techniques, all crafted in the Rust programming language. It offers a comprehensive suite of projects aimed at enhancing security assessments and intrusion testing for professionals. This article delves into the rich array of tools available, from APC injection to encryption …

Awesome Web Security – The Ultimate Guide To Mastering Techniques, Tools, And Resources

Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this happen so often? There can be many factors involved including misconfiguration, shortage of engineers’ security skills, etc. To combat this, here is a curated list of Web Security materials and resources for learning cutting edge …

Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide

An Ansible Role that installs Bloodhound-CE on a debian based system. To force the role to re-run, stop the docker container and remove the ludus_bloodhound_ce_install_path folder Requirements Debian based OS Role Variables Available variables are listed below, along with default values (see defaults/main.yml): Dependencies geerlingguy.docker Example Ludus Range Config ludus: