Cloud Exploit Framework Usage python3 tc.py -h_______ _ _ _____ _ _|__ __| | | | / ____| | | …

Cloud Exploit Framework Usage python3 tc.py -h_______ _ _ _____ _ _|__ __| | | | / ____| | | …
IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing …
════════════════════════════════════╦═══ ╔═╦═╗ ╔═╗ ╔═╗ ╔═╗ ╔═╦═╗ ╔═╗ ╔══╔═╗ ╠═╗ ═╩ ╩ ╩═╚═╝═╩ ╩═╚═╝═╩ ╩ ╩═╚═╝═╩ ╠═╝═╩ ╩═ ════════════════════════════════╩═══════ By Retr0id …
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws Requirements Python 3 Python …
Lateral movement analyzer (LATMA) collects authentication logs from the domain and searches for potential lateral movement attacks and suspicious activity. …
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out …
Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. …
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
A script for generating common revshells fast and easy. Especially nice when in need of PowerShell and Python revshells, which …
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, …