Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the …


Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the …

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for …

Demonized Shell is an Advanced Tool for persistence in linux. Install git clone https://github.com/MatheuZSecurity/D3m0n1z3dShell.gitcd D3m0n1z3dShellchmod +x demonizedshell.shsudo ./demonizedshell.sh One-Liner Install …

PhantomCrawler allows users to simulate website interactions through different proxy IP addresses. It leverages Python, requests, and BeautifulSoup to offer …

Overview RansomwareSim is a simulated ransomware application developed for educational and training purposes. It is designed to demonstrate how ransomware …

Have you ever watched a film where a hacker would plug-in, seemingly ordinary, USB drive into a victim’s computer and …

Pantheon is a GUI application that allows users to display information regarding network cameras in various countries as well as …

Legba is a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust and the Tokio asynchronous runtime in …
Telegram Nearby Map uses OpenStreetMap and the official Telegram library to find the position of nearby users. Please note: Telegram’s …
VED (Vault Exploit Defense)-eBPF leverages eBPF (extended Berkeley Packet Filter) to implement runtime kernel security monitoring and exploit detection for …