IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing …
Monomorph – MD5-Monomorphic Shellcode Packer – All Payloads Have The Same MD5 Hash
════════════════════════════════════╦═══ ╔═╦═╗ ╔═╗ ╔═╗ ╔═╗ ╔═╦═╗ ╔═╗ ╔══╔═╗ ╠═╗ ═╩ ╩ ╩═╚═╝═╩ ╩═╚═╝═╩ ╩ ╩═╚═╝═╩ ╠═╝═╩ ╩═ ════════════════════════════════╩═══════ By Retr0id …
Ghauri – An Advanced Cross-Platform Tool That Automates The Process Of Detecting And Exploiting SQL Injection Security Flaws
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws Requirements Python 3 Python …
LATMA – Lateral Movement Analyzer Tool
Lateral movement analyzer (LATMA) collects authentication logs from the domain and searches for potential lateral movement attacks and suspicious activity. …
PXEThief – Set Of Tooling That Can Extract Passwords From The Operating System Deployment Functionality In Microsoft Endpoint Configuration Manager
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out …
Havoc – Modern and malleable post-exploitation command and control framework
Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. …
Autobloody – Tool To Automatically Exploit Active Directory Privilege Escalation Paths Shown By BloodHound
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
Shells – Little Script For Generating Revshells
A script for generating common revshells fast and easy. Especially nice when in need of PowerShell and Python revshells, which …
Octopii – An AI-powered Personal Identifiable Information (PII) Scanner
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, …
Sandman – NTP Based Backdoor For Red Team Engagements In Hardened Networks
Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a …