Tuesday, July 27, 2021
Home Tags Documents

Tag: Documents

Must Need

Backstab : A Tool To Kill Antimalware Protected Processes

Backstab : A Tool To Kill Antimalware Protected Processes

Backstab is a tool to Kill Antimalware Protected Processes. Kill EDR Protected Processes Have...
TorghostNG : Make All Your Internet Traffic Anonymized With Tor Network

TorghostNG : Make All Your Internet Traffic Anonymized With Tor Network

TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3. Rewritten from...
SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...
SIPI

SIPI – Simple IP Information Tools for Reputation Data Analysis

SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do...
Orbit : Blockchain Transactions Investigation Tool

Orbit : Blockchain Transactions Investigation Tool

Orbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a...
Gitls : Enumerate Git Repository URL From List Of URL / User / Org

Gitls : Enumerate Git Repository URL From List Of URL /...

Gitls tool is available when the repository, such as GitHub, is included in the bug bounty scope. Sometimes specified as an org...
Kconfig : Hardened-Check – A Tool For Checking The Hardening Options In The Linux Kernel Config

Kconfig : Hardened-Check – A Tool For Checking The Hardening Options...

Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config There are plenty of Linux...