Trackgram Use Instagram location features to track an account Usage At this moment the usage of Trackgram is extremly simple:1. …

Trackgram Use Instagram location features to track an account Usage At this moment the usage of Trackgram is extremly simple:1. …
File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques! POC video: File upload restrictions bypass by using different bug …
Source Code Management Attack Toolkit – SCMKit is a toolkit that can be used to attack SCM systems. SCMKit allows …
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts. See the TeamFiltration wiki page for …
The SteaLinG is an open-source penetration testing framework designed for social engineering After the hack, you can upload it to …
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Changed from sam-the-admin. Usage SAM THE ADMIN CVE-2021-42278 + …
A python script to scan for Apache Tomcat server vulnerabilities. Features Multithreaded workers to search for Apache tomcat servers. Multiple …
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc. Created by Nick Swink from Layer 8 …
Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via …
A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the …