Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally …
Dive – A Tool For Exploring Each Layer In A Docker Image
A tool for exploring a docker image, layer contents, and discovering ways to shrink the size of your Docker/OCI image. …
Php-Malware-Finder – Detect Potentially Malicious PHP Files
PHP-malware-finder does its very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malwares/webshells. …
AWS-Loot – Pull Secrets From An AWS Environment
Searches an AWS environment looking for secrets, by enumerating environment variables and source code. This tool allows quick enumeration over …
EDRHunt – Scan Installed EDRs And AVs On Windows
EDRHunt scans Windows services, drivers, processes, registry for installed EDRs (Endpoint Detection And Response). Read more about EDRHunt here. Install …
Warning: If You Use the Zimbra Webmail Older Version, you could be a Victim of Phishing!
A technical report by Volexity revealing a continuing campaign uncovered an active campaign taking advantage of a zero-day susceptibility in …
Instaloctrack – An Instagram OSINT Tool To Collect All The Geotagged Locations Available On An Instagram Profile In Order To Plot Them On A Map, And Dump Them In A JSON
A tool to scrape geotagged locations on Instagram profiles. Output in JSON & interactive map. TL;DR : ascineema, video of the project …
Espionage – A Network Packet And Traffic Interceptor For Linux. Spoof ARP And Wiretap A Network
Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows …
SentryPeer – A Distributed Peer To Peer List Of Bad Actor IP Addresses And Phone Numbers Collected Via A SIP Honeypot
A distributed list of bad actor IP addresses and phone numbers collected via a SIP Honeypot. Introduction This is basically …
SQLRecon – A C# MS SQL Toolkit Designed For Offensive Reconnaissance And Post-Exploitation
A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the …