This tools is very helpful for finding vulnerabilities present in the Web Applications. A web application scanner explores a web …
Handle-Ripper – Windows Handle Hijacker
Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system …
Forensia – Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase
Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And …
LSMS – Linux Security And Monitoring Scripts
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events …
Firefly – Black Box Fuzzer For Web Applications
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing …
BackupOperatorToolkit – The BackupOperatorToolkit Contains Different Techniques Allowing You To Escalate From Backup Operator To Domain Admin
Usage The BackupOperatorToolkit (BOT) has 4 different mode that allows you to escalate from Backup Operator to Domain Admin.Use “runas.exe …
Killer – Is A Tool Created To Evade AVs And EDRs Or Security Tools
It’s a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Module Stomping …
Fiber – Using Fibers To Run In-Memory Code In A Different And Stealthy Way
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the …
Kali Linux 2023.2 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2023.2. This release has various impressive updates. Source : KitPloit – …
C2-Hunter – Extract C2 Traffic
C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time. The …