This tool allows you to send Java bytecode in the form of class files to your clients (or potential targets) …
EvilnoVNC – Ready To Go Phishing Platform
EvilnoVNC is a Ready to go Phishing Platform. Unlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real …
Monkey365 – Tool For Security Consultants To Easily Conduct Not Only Microsoft 365, But Also Azure Subscriptions And Azure Active Directory Security Configuration Reviews
Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also …
GodGenesis – A Python3 Based C2 Server To Make Life Of Red Teamer A Bit Easier. The Payload Is Capable To Bypass All The Known Antiviruses And Endpoints
God Genesis is a C2 server purely coded in Python3 created to help Red Teamers and Penetration Testers. Currently It …
Matano – The Open-Source Security Lake Platform For AWS
Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data …
FUD-UUID-Shellcode – Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings madness
Introduction Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings …
SteaLinG – Open-Source Penetration Testing Framework Designed For Social Engineering
The SteaLinG is an open-source penetration testing framework designed for social engineering After the hack, you can upload it to …
Toyota Discloses Data Breach Impacting Source Code
Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third …
HSTP – Simple Hyper Service Transfer Protocol On Networks
The protocol aims to develop a application layer abstraction for the Hyper Service Transfer Protocol. HSTP is a recursion as …
A critical vulnerability in vm2 Allow a Remote Attacker to Escape The Sandbox
Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted …