kalilinuxtools

Afrog – Empowering Bug Bounty, Pentesting, And Red Teaming With A High-Performance Security Tool

In the ever-evolving landscape of cybersecurity, the need for robust tools that aid Bug Bounty programs, Penetration Testing (Pentest), and…

1 year ago

Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox

Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of…

1 year ago

CsWhispers – Supercharge Your C# Project With D/Invoke And Indirect Syscalls

Source generator to add D/Invoke and indirect syscall methods to a C# project. A game-changer for C# developers, CsWhispers is…

1 year ago

XLL Dropper – Mastering A Red Team’s Ultimate Weapon

Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red…

1 year ago

ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint…

1 year ago

C++ Standard Library And Qt, Python, etc. Implementation in C – Reviving the Spirit of C For Enhanced Development

This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with…

1 year ago

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity…

1 year ago

VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation

Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd…

1 year ago

Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template

An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID…

1 year ago

Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And Terraform

Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds…

1 year ago