Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …

Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a …
FOR: Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as a …
Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry. In this list I decided to …
DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementation LSA plugin DLL written in C++ which could be …
Attackers think in graphs, defenders think in actions, management think in charts. GoodHound operationalises Bloodhound by determining the busiest paths …
An advanced, yet simple, tunneling tool that uses a TUN interface. by TNP IT Security Introduction Ligolo-ng is a simple, …
“The best feeling is to win by knockout.” – Nonito Donaire Overview KnockOutlook is a C# project that interacts with …
Read the blog posts here: Installation The install.sh is designed to work on a Kali Linux distro. ________________< PEzor!! v3.0.3 …
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services …
GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally. …