Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …

Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …
COM Hijacking VOODOO COM-hunter is a COM Hijacking persistnce tool written in C#. This tool was inspired during the RTO …
Welcome! This is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program …
FOR: Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as a …
Zed Attack Proxy Scripts for finding CVEs and Secrets. Building This project uses Gradle to build the ZAP add-on, simply …
Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store …
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or …
A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs …
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a …
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality …