Pentesting Tools

Noir : Simplifying Zero-Knowledge Proofs For Developers

Noir is a domain-specific language (DSL) designed for constructing privacy-preserving Zero-Knowledge Proof (ZKP) programs. Its primary goal is to simplify…

2 weeks ago

Defender-For-Cloud-Apps Toolbox : Powering Up Microsoft Cloud App Security With PowerShell

The Defender-for-Cloud-Apps Toolbox is a robust collection of PowerShell functions designed to streamline and automate the management of Microsoft Cloud…

2 weeks ago

multi-socifi-v2 : Powering Real-Time Multiplayer Poker Games

The "multi-socifi-v2" appears to be a server-side implementation for managing multiplayer poker games. It utilizes socket communication to handle real-time…

2 weeks ago

HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing

HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation,…

2 weeks ago

Binary Ninja Ollama Plus : Elevating Code Analysis With Advanced Features For Security Professionals

The Binary Ninja Ollama Enhanced plugin is an advanced tool tailored for developers and reverse engineers, offering enhanced functionality for…

2 weeks ago

Gitoxide : Harnessing Rust For Next-Generation Git Operations

Gitoxide is a modern, pure-Rust implementation of Git, designed to offer a future-proof, high-performance alternative to traditional Git tools. Its…

2 weeks ago

ChromeStealer : A Tool For Extracting Chrome Passwords

ChromeStealer is an educational tool developed by @bernKing20 to demonstrate how to extract and decrypt stored passwords from Google Chrome…

2 weeks ago

DCOMUploadExec : A Tool For Lateral Movement Exploits Using IMsiServer

DCOMUploadExec is a proof-of-concept (PoC) tool designed to exploit the Distributed Component Object Model (DCOM) for lateral movement within a…

2 weeks ago

CognitoHunter : A Comprehensive AWS Cognito Analysis Toolkit

CognitoHunter is a specialized toolkit designed for security researchers and penetration testers to analyze and exploit vulnerabilities in AWS Cognito…

2 weeks ago

Windows Service Creation Or Modification With binpath via sc.exe

Windows services are essential components that run in the background to perform various tasks. The sc.exe utility, a command-line tool…

2 weeks ago