The purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools …
YouTube Accounts Hijacked by Cookie Theft Malware
Google has reported that it disrupted the phishing attacks where threat actors had tried to hijack various YouTube accounts using …
VECTR – A Tool That Facilitates Tracking Of Your Red And Blue Team Testing Activities To Measure Detection And Prevention Capabilities Across Different Attack Scenarios
VECTR documentation can be found here: https://docs.vectr.io VECTR Community Discord Channel: https://discord.gg/2FRd8zf728 VECTR is a tool that facilitates tracking of …
Terra – OSINT Tool On Twitter And Instagram
OSINT Tool On Twitter And Instagram. Installation Clone the github repo $ git clone https://github.com/xadhrit/terra.git Change Directory $ cd terra …
PowerShx – Run Powershell Without Software Restrictions
Unmanaged PowerShell execution using DLLs or a standalone executable. Introduction PowerShx is a rewrite and expansion on the PowerShdll project. …
PortBender – TCP Port Redirection Utility
PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one …
NTFSTool – Forensics Tool For NTFS (Parser, MTF, Bitlocker, Deleted Files)
NTFSTool is a forensic tool focused on NTFS volumes. It supports reading partition info (mbr, partition table, vbr) but also …
Limelighter – A Tool For Generating Fake Code Signing Certificates Or Signing Real Ones
A tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products …
Karma_V2 – A Passive Open Source Intelligence (OSINT) Automated Reconnaissance (Framework)
𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework) 𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 can be used by Infosec Researchers, …
ImpulsiveDLLHijack – C# Based Tool Which Automates The Process Of Discovering And Exploiting DLL Hijacks In Target Binaries
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered …