Wednesday, July 28, 2021
Home Tags Bulwark

Tag: Bulwark

Must Need

MacHound : An extension to audit Bloodhound collecting and ingesting of Active Directory relationships on MacOS hosts

MacHound : An extension to audit Bloodhound collecting and ingesting of...

MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts. MacHound collects...
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
Swift-Attack : Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods

Swift-Attack : Unit Tests For Blue Teams To Aid With Building...

Swift-Attack is a unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have...
Spiderfoot : The Most Complete OSINT Collection & Reconnaissance Tool

Spiderfoot : The Most Complete OSINT Collection & Reconnaissance Tool

SpiderFoot is an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given...
OverRide : Binary Exploitation And Reverse-Engineering

OverRide : Binary Exploitation And Reverse-Engineering

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level...
RDPScan : A Quick Scanner For “BlueKeep”  Vulnerability

RDPScan : A Quick Scanner For “BlueKeep” Vulnerability

RDPScan is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the...
BabySploit

BabySploit – Beginner Pentesting Toolkit/Framework Written in Python

BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a...