AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. How does it work? AutoPWN Suite uses nmap …
Nipe – An Engine To Make Tor Network Your Default Gateway
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It …
Lockc – Making Containers More Secure With eBPF And Linux Security Modules (LSM)
lockc is open source sofware for providing MAC (Mandatory Access Control) type of security audit for container workloads. The main …
Puwr – SSH Pivoting Script For Expanding Attack Surfaces On Local Networks
Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …
COM-Hunter – COM Hijacking VOODOO
COM Hijacking VOODOO COM-hunter is a COM Hijacking persistnce tool written in C#. This tool was inspired during the RTO …
SMB-Session-Spoofing – Tool To Create A Fake SMB Session
Welcome! This is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program …
Notionterm – Embed Reverse Shell In Notion Pages
FOR: Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as a …
A Ransomware Group Claims to Have Breached the Foxconn Factory
Malicious hackers claim to have hacked into the network system of the Foxconn Baja factory in Mexico on June 11. …
Zap-Scripts – Zed Attack Proxy Scripts For Finding CVEs And Secrets
Zed Attack Proxy Scripts for finding CVEs and Secrets. Building This project uses Gradle to build the ZAP add-on, simply …
Wrongsecrets – Examples With How To Not Use Secrets
Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store …