We all have social media accounts and use them to share photos, videos, and thoughts with the world. But what …
Havoc – Modern and malleable post-exploitation command and control framework
Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. …
OFRAK – Unpack, Modify, And Repack Binaries
OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to: Identify and …
Autobloody – Tool To Automatically Exploit Active Directory Privilege Escalation Paths Shown By BloodHound
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
S3Crets_Scanner – Hunting For Secrets Uploaded To Public S3 Buckets
S3cret Scanner tool designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets …
NetLlix – A Project Created With An Aim To Emulate And Test Exfiltration Of Data Over Different Network Protocols
A project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is …
Squarephish – An advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes
SquarePhish is an advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes. …
HTTPLoot – An Automated Tool Which Can Simultaneously Crawl, Fill Forms, Trigger Error/Debug Pages And “Loot” Secrets Out Of The Client-Facing Code Of Sites
An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and “loot” secrets out of the client-facing code …
Which team is responsible for debriefing after a cyber attack?
Cybersecurity is a rapidly growing field with a lot of potential. Not only do cyberattacks have the potential to devastate …
Shennina – Automating Host Exploitation With AI
Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, …