Retrieve and display information about active user sessions on remote computers. No admin privileges required. The tool leverages the remote …


Retrieve and display information about active user sessions on remote computers. No admin privileges required. The tool leverages the remote …

Subdomain takeover is a common vulnerability that allows an attacker to gain control over a subdomain of a target domain …

PingRAT secretly passes C2 traffic through firewalls using ICMP payloads. Features: Uses ICMP for Command and Control Undetectable by most …

The original 403fuzzer.py 🙂 Fuzz 401/403ing endpoints for bypasses This tool performs various checks via headers, path normalization, verbs, etc. …

Description Presented at CODE BLUE 2023, this project titled Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint …

LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call …

SQLMC (SQL Injection Massive Checker) is a tool designed to scan a domain for SQL injection vulnerabilities. It crawls the …

BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR. BadExclusionsNWBO copies and runs Hook_Checker.exe …

NTLM Relay Gat is a powerful tool designed to automate the exploitation of NTLM relays using ntlmrelayx.py from the Impacket …

A command line Windows API tracing tool for Golang binaries. Note: This tool is a PoC and a work-in-progress prototype …