Tuesday, June 15, 2021
Home Tags IOC Scanner

Tag: IOC Scanner

Must Need

iKy : OSINT Project To Collect Information From Mail

iKy : OSINT Project To Collect Information From Mail

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.
Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers

Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation...

Dockernymous is a script used to create a whonix like gateway/workstation environment with docker containers. It is a start script for Docker...
Dent : A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft’s WDAPT Sensors

Dent : A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In...

Dent is a framework generates code to exploit vulnerabilties in Microsoft Defender Advanced Threat Protection's Attack Surface Reduction (ASR) rules to execute...
HiddenEyeReborn : HiddenEye With Completely New Codebase & Better Features Set

HiddenEyeReborn : HiddenEye With Completely New Codebase & Better Features Set

HiddenEyeReborn is my their try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE has mainly phishing features. But we...
WAES : Web Auto Enum & Scanner

WAES : Web Auto Enum & Scanner

WAES is nothing but Web Auto Enum & Scanner. Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial....
AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon

AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike...

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt...
OverRide : Binary Exploitation And Reverse-Engineering

OverRide : Binary Exploitation And Reverse-Engineering

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level...