A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the …
Kali Linux 2023.2 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2023.2. This release has various impressive updates. Source : KitPloit – …
C2-Hunter – Extract C2 Traffic
C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time. The …
Bypass-Sandbox-Evasion – Bypass Malware Sandbox Evasion Ram Check
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether …
PythonMemoryModule – Pure-Python Implementation Of MemoryModule Technique To Load Dll And Unmanaged Exe Entirely From Memory
“Python memory module” AI generated pic – hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe …
XSS-Exploitation-Tool – An XSS Exploitation Tool
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. This tool is …
LinkedInDumper – Tool To Dump Company Employees From LinkedIn API
Python 3 script to dump company employees from LinkedIn API Description LinkedInDumper is a Python 3 script that dumps employee …
Kubestroyer – Kubernetes Exploitation Tool
About The Project Kubestroyer is a Golang exploitation tool that aims to take advantage of Kubernetes clusters misconfigurations. The tool …
DCVC2 – A Golang Discord C2 Unlike Any Other
This multi operating system compatible tool was created to leverage Discord’s voice channels for command and control operations. This tool …
MAAD-AF – MAAD Attack Framework – An Attack Tool For Simple, Fast And Effective Security Testing Of M365 And Azure AD
MAAD-AF is an open-source cloud attack tool developed for testing security of Microsoft 365 & Azure AD environments through adversary …