kalilinuxtools

Afrog – Empowering Bug Bounty, Pentesting, And Red Teaming With A High-Performance Security Tool

In the ever-evolving landscape of cybersecurity, the need for robust tools that aid Bug Bounty programs, Penetration Testing (Pentest), and…

10 months ago

Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox

Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of…

10 months ago

CsWhispers – Supercharge Your C# Project With D/Invoke And Indirect Syscalls

Source generator to add D/Invoke and indirect syscall methods to a C# project. A game-changer for C# developers, CsWhispers is…

10 months ago

XLL Dropper – Mastering A Red Team’s Ultimate Weapon

Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red…

10 months ago

ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint…

10 months ago

C++ Standard Library And Qt, Python, etc. Implementation in C – Reviving the Spirit of C For Enhanced Development

This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with…

10 months ago

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity…

10 months ago

VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation

Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd…

10 months ago

Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template

An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID…

10 months ago

Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And Terraform

Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds…

10 months ago