Abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force. Use it while it still …
D4TA-HUNTER – GUI Osint Framework With Kali Linux
D4TA-HUNTER is a tool created in order to automate the collection of information about the employees of a company that …
Pycrypt – Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products
Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products Make Sure your payload file have all the libraries …
EvilTree – A Remake Of The Classic “Tree” Command With The Additional Feature Of Searching For User Provided Keywords/Regex In Files, Highlighting Those That Contain Matche
A standalone python3 remake of the classic “tree” command with the additional feature of searching for user provided keywords/regex in …
Kubeeye – Tool To Find Various Problems On Kubernetes, Such As Application Misconfiguration, Unhealthy Cluster Components And Node Problems
KubeEye is an inspection tool for Kubernetes to discover Kubernetes resources (by OPA ), cluster components, cluster nodes (by Node-Problem-Detector) …
MSMAP – Memory WebShell Generator
Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients. …
SharpSCCM – A C# Utility For Interacting With SCCM
SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and …
Octopii – An AI-powered Personal Identifiable Information (PII) Scanner
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, …
Scrcpy – Display And Control Your Android Device
pronounced “screen copy“ Read in another language This application provides display and control of Android devices connected via USB or …
Stegowiper – A Powerful And Flexible Tool To Apply Active Attacks For Disrupting Stegomalware
Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all …