Trackgram Use Instagram location features to track an account Usage At this moment the usage of Trackgram is extremly simple:1. …
Gmailc2 – A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions
This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is validbecause …
Probable_Subdomains – Subdomains Analysis And Generation Tool. Reveal The Hidden!
Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a …
Reverseip_Py – Domain Parser For IPAddress.com Reverse IP Lookup
Domain parser for IPAddress.com Reverse IP Lookup. Writen in Python 3. What is Reverse IP? Reverse IP refers to the …
Faraday – Open Source Vulnerability Management Platform
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation …
ThreatHound – Tool That Help You On Your IR & Threat Hunting And CA
This tool will help you on your IR & Threat Hunting & CA. just drop your event log file and …
Upload_Bypass_Carnage – File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!
File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques! POC video: File upload restrictions bypass by using different bug …
OffensivePipeline – Allows You To Download And Build C# Tools, Applying Certain Modifications In Order To Improve Their Evasion For Red Team Exercises
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red …
Misp-Extractor – Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)
This code connects to a given MISP (Malware Information Sharing Platform) server and parses a given number of events, writing …
Web-Hacking-Playground – Web Application With Vulnerabilities Found In Real Cases, Both In Pentests And In Bug Bounty Programs
Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests …