High-Performance word generator with a per-position configureable charset Mask attackTry all combinations from a given keyspace just like in Brute-Force …
Debotnet – A Tiny Portable Tool For Controlling Windows 10’s Many Privacy-Related Settings And Keep Your Personal Data Private
A free and portable tool for controlling Windows 10’s many privacy-related settings and keep your personal data private. Your preparation …
OWASP Threat Dragon – Cross-Platform Threat Modeling Application
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations. …
GoGhost – High Performance, Lightweight, Portable Open Source Tool For Mass SMBGhost Scan
GoGhost is a High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan.InstallationYou can download Windows Binary or Linux …
KITT-Lite – Python-Based Pentesting CLI Tool
The KITT Penetration Testing Framework was developed as an open source solution for pentesters and programmers alike to compile the …
UsoDllLoader – Windows – Weaponizing Privileged File Writes With The Update Session Orchestrator Service
2020-06-06 Update: this trick no longer works on the latest builds of Windows 10 Insider Preview. This means that, although …
Ligolo – Reverse Tunneling Made Easy For Pentesters, By Pentesters
Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety …
GhostShell – Malware Indetectable, With AV Bypass Techniques, Anti-Disassembly, And More
In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning …
MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory
Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by …
AutoRDPwn v5.1 – The Shadow Attack Framework
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …