This tool will help you on your IR & Threat Hunting & CA. just drop your event log file and …
Upload_Bypass_Carnage – File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!
File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques! POC video: File upload restrictions bypass by using different bug …
OffensivePipeline – Allows You To Download And Build C# Tools, Applying Certain Modifications In Order To Improve Their Evasion For Red Team Exercises
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red …
Misp-Extractor – Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)
This code connects to a given MISP (Malware Information Sharing Platform) server and parses a given number of events, writing …
Web-Hacking-Playground – Web Application With Vulnerabilities Found In Real Cases, Both In Pentests And In Bug Bounty Programs
Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests …
Invoke-Transfer – PowerShell Clipboard Data Transfer
Invoke-Transfer is a PowerShell Clipboard Data Transfer. This tool helps you to send files in highly restricted environments such as …
Email-Vulnerablity-Checker – Find Email Spoofing Vulnerablity Of Domains
Verify whether the domain is vulnerable to spoofing by Email-vulnerablity-checker Features This tool will automatically tells you if the domain …
DNSrecon-gui – DNSrecon Tool With GUI For Kali Linux
DNSRecon is a DNS scanning and enumeration tool written in Python, which allows you to perform different tasks, such as …
Powershell-Backdoor-Generator – Obfuscated Powershell Reverse Backdoor With Flipper Zero And USB Rubber Ducky Payloads
Reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature after every run. …
Leaktopus – Keep Your Source Code Under Control
Keep your source code under control. Key Features Plug&Play – one line installation with Docker. Scan various sources containing a …