kalilinuxtools

RedELK Server – DeploymentEssential Configuration Variables Overview

We delve into the process of setting up a RedELK server, focusing on the critical configuration variables required for successful…

12 months ago

RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems.…

12 months ago

Crawl4AI – The Future Of Asynchronous Web Crawling For AI

Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking…

12 months ago

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively…

12 months ago

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares,…

12 months ago

MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection

textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when…

12 months ago

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

12 months ago

GShark – A Comprehensive Guide To Sensitive Information Management System Deployment

The project is based on Go and Vue to build a management system for sensitive information detection. For the full…

12 months ago

C2 Server Installation – A Comprehensive Guide For Red Team Operations

Setting up a Command and Control (C2) server is a critical step in establishing a robust red team infrastructure. This…

12 months ago

Redirector Installation – A Comprehensive Guide For Red Team Operations

Installing and configuring redirectors as part of your red team infrastructure. Follow these step-by-step instructions to deploy and optimize redirectors…

12 months ago