As last year, this year we made a ranking with the most popular tools between January and December 2022. Without …

As last year, this year we made a ranking with the most popular tools between January and December 2022. Without …
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently …
Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. …
OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to: Identify and …
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
S3cret Scanner tool designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets …
A project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is …
SquarePhish is an advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes. …
An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and “loot” secrets out of the client-facing code …
Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, …