Pentesting Tools

GBounty : Streamlining Vulnerability Scanning For Web Applications

Multi-step website vulnerability scanner designed to help pentesters and bug hunters identify potential vulnerabilities in web applications. We have a…

2 weeks ago

go-lsass : Remote LSASS Memory Dumping via SMB

Package go-lsass is a tool built to dump the memory of the LSASS process remotely by uploading a local LSASS…

2 weeks ago

atomicgen.io : Simplifying Atomic Red Team Test Creation

Welcome to atomicgen.io, a simple tool designed to create Atomic Red Team tests with ease. This platform provides a user-friendly…

2 weeks ago

RevC2 : Websocket Setup Secure Testing Guide

This Python script emulates the websocket server side of RevC2 by sending the type you select and rendering the response.…

2 weeks ago

DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files on disk. It can be…

2 months ago

Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash…

3 months ago

RedELK Server – DeploymentEssential Configuration Variables Overview

We delve into the process of setting up a RedELK server, focusing on the critical configuration variables required for successful…

3 months ago

RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems.…

3 months ago

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares,…

3 months ago

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

3 months ago