Ligolo : Reverse Tunneling Made Easy For Pentesters

0

Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety (TLS certificate with elliptical curve). It is comparable to Meterpreter with Autoroute + Socks4a, but more stable and faster. Use Case You compromised a Windows / Linux / Mac server during your external audit. This server is located inside a LAN network...

Eviloffice : Inject Macro & DDE Code Into Excel & Word Documents

0

Eviloffice is a tool used to inject macro and DDE code into Excel and Word documents (reverse shell). Features Inject malicious Macro on formats: docm, dotm, xlsm, xltmInject malicious DDE code on formats: doc, docx, dot, xls, xlsx, xlt, xltxPython2/Python3 CompatibleTested: Win10 (MS Office 14.0) Requirements Microsoft Office (Word/Excel)pywin32: python -m pip install -r requirements.txt Also Read - Guardedbox : Online Client-Side Manager For...

Inshackle : Instagram Hacks

0

Inshackle is a tool used to hack Instagram and track unfollowers, increase your followers, download Stories, etc. Features Unfollow TrackerIncrease FollowersDownload: Stories, Saved Content, Following/followers list, Profile InfoUnfollow all your following Also Read - Guardedbox : Online Client-Side Manager For Secure Storage & Secrets Sharing Usage git clone https://github.com/thelinuxchoice/inshackle cd inshackle bash inshackle.sh Download

GhostShell : Malware Indetectable With AV Bypass Techniques & Anti-Disassembly

0

GhostShell is a Malware indetectable, with AV bypass techniques, anti-disassembly, etc. In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning more. I'm not responsible for your actions. Attention!!! To check if the antivirus is detecting the malware, NEVER send it to the virustotal, IT WILL BE SENT TO THE ANTIVIRUS...

Forerunner : Fast & Extensible Network Scanning Library

0

The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network centric applications such as: IP Scanners, Port Knockers, Clients, Servers, etc. In it's current state, the Forerunner library is able to both synchronously and asynchronously scan and port knock IP addresses in order to obtain information about the device...

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

0
FisherMan : CLI Program That Collects Information From Facebook User Profiles Via Selenium

Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation phase. Running enumy will enumerate the box for common security vulnerabilities. Installation You can download the final binary from the release x86 or x64 tab. Statically linked to musl Transfer the final enumy binary to the target machine. latest...

Bing-IP2Hosts : A Bing.com Web Scraper That Discovers Websites By IP Address

0

Bing-ip2hosts is a Bing.com web scraper that discovers hostnames by IP address. Bing is the flagship Microsoft search engine formerly known as MSN Search and Live Search. It provides a feature unique to search engines - it allows searching by IP address. Bing-ip2hosts uses this feature. It can be used to discover subdomains and other related domains. It also helps to...

Vault : Tool For Secrets Management, Encryption As A Service & Privileged Access Management

0

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log. A modern system requires access to a multitude of secrets: database credentials, API...

Fantastic Storage Solutions for Tech Companies

0

Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets might pile up to unmanageable levels, resulting in you needing some innovative storage solutions. Moving physical documents online, investing in modern storage,and decluttering workspaces are all fantastic ways of achieving a cleaner, more productive workplace. Move what you can onto...

ADCollector : Tool To Quickly Extract Valuable Information From Active Directory

0

ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point. Notes: It is not an alternative to the powerful PowerView, it just automates enumeration to quickly identify juicy information without thinking too much at the early Recon stage....