AppleConnect – Streamlining Local Network With Bonjour
AppleConnect is a small Swift wrapper around a Network TCP stream on the local network (using Bonjour for discovery). Even though the transport is two-way, the API is built around a "service" that is offered by a single server and to which many clients can connect. Usage Setup for servers differs a little bit from that for clients. Once a connection...
Jormungandr – Unveiling The Kernel Power Of COFF Loading
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. The only supported type of COFF is an x64 kernel COFF (meaning a COFF that uses functions from either NTOSKRNL or SSDT). This project is not supported to run with VBS enabled because it is using pools with execute permissions but this project should...
OSINT GPT – ChatGPT Powered Open Source Intelligence Tool
osintgpt is a Python package for leveraging OpenAI's GPT models to analyze text data and perform tasks such as calculating text embeddings, searching for similar documents, and more. It is designed for use in open-source intelligence (OSINT) applications and research. Installation You can install the osintgpt package using pip. pip install osintgpt Given the recent changes and updates, it is highly recommended to upgrade to the latest...
ADCSKiller – An ADCS Exploitation Automation Tool
ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages the features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure. Please note that the ADCSKiller is currently in its first draft and will undergo further refinements and additions in future updates. Features Enumerate Domain Administrators via...
OWASP WrongSecrets: Multi-Tenant CTF Party Setup
Welcome to OWASP WrongSecrets CTF Party, where Capture The Flag tasks meet scalability without any problems. Our platform is made for dynamic, multi-tenant CTF games. It was made possible by the pioneering work of the OWASP MultiJuicer. Whether you're a contestant who wants to take on the tasks or an organizer who wants a simple setup, this guide will show...
Supernova : The Ultimate Shellcode Encryption & Conversion Toolkit
Meet Supernova, the new and improved shellcode encryption tool made for today's ethical hackers. Supernova is written in Golang and works with both Windows and Linux. It has a wide range of encryption ciphers, such as ROT, XOR, RC4, and AES. What makes it different? It's not just an encryptor; it also changes your encrypted shellcode into forms that...
Combine Tool – Bypass EDRs & Secure Windows Credentials
By readapting the safetydump rust library (many thanks to the author!!!), I have been able to EASILY bypass all the countermeasures put in place by most EDRs, except Kaspersky EDR, and TrendMicro (new detection, from a couple hours ago) dbghelp!MiniDumpWriteDump with a custom callback could be used, until a year ago, to bypass most antivirus and EDR solutions. Now, most of...
EDRSandblast-GodFault: Advanced EDR Bypass Tool
EDRSandblast-GodFault is an advanced EDR bypass tool aimed at security researchers and organizations. Its purpose is to evaluate the effectiveness of current EDR systems by simulating real-world attack techniques. Use this tool responsibly and only on systems where you have explicit authorization. Integrates GodFault into EDR Sandblast, achieving the same result without the use of any vulnerable drivers. Example Output C:UsersuserDesktopOffsets>EDRSandblast.exe --kernelmode cmd D3FC0N 30...
Prebuilt Multi-Arch Binaries for Enhanced Device Management
Prebuilt binaries for multiple architeture (arm, armeb, aarch64, aarch64_be, mips, mips1, mipsel, mipsel1, mips64, mips64el, powerpc, powerpc64, powerpc64le, riscv64, i586, x86_64) All binaries are statically linked and stripped. Please go to the Release page for downloads. *archName*_tools.zip contains tools' binary (see Tools Section) for that specific arch, and allinone.zip contains all of it. Or download single file directly from bin branch. The source code and scripts can be found in the...
Empowering Frontline Workers: Streamline Device Management For An Enhanced Employee Experience
In today's fast-paced world, frontline workers play a vital role in delivering services and products directly to customers. From healthcare providers and retail associates to logistics personnel and customer service representatives, these frontline workers rely on mobile devices to streamline their tasks. To elevate and unleash their full potential, organizations are turning to the power of frontline device management solutions....