Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …

Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …
CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and …
DataSurgeon (ds) is a versatile tool designed for incident response, penetration testing, and CTF challenges. It allows for the extraction …
Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …
Demo Description Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to …
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of …
Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for “risky” attributes that make them …
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by …
A Python 3.5+ tool that uses asyncio to brute force domain names asynchronously. Speed It’s fast. Benchmarks on small VPS …
Enumrate AWS services! with no nosies awsEnum is a python script enumrate AWS services through the provided credential. ▄▄▄▄▄▄ ▄ …