Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …

Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …
By Cas van Cooten (@chvancooten), with special thanks to some awesome folks: Fabian Mosch (@S3cur3Th1sSh1t) for sharing dynamic invocation implementation …
The script FindUncommonShares.py is a Python equivalent of PowerView‘s Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows …
The plugin is created to help automated scanning using Burp in the following scenarios: Access/Refresh token Token replacement in XML,JSON …
Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes (in 22000 hashcat format), MGT …
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability …
CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and …
The CertVerify is a tool designed to detect executable files (exe, dll, sys) that have been signed with untrusted or …
Graphicator is a GraphQL “scraper” / extractor. The tool iterates over the introspection document returned by the targeted GraphQL endpoint, …
The tool is being tested in the beta phase, and it only gathers MacOS system information at this time. The …