Get fresh Syscalls from a fresh ntdll.dll copy. This code can be used as an alternative to the already published …
OffensiveVBA – Code Execution And AV Evasion Methods For Macros In Office Documents
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and …
Faraday Community – Open Source Penetration Testing and Vulnerability Management Platform
Faraday was built from within the security community, to make vulnerability management easier and enhance our work. What IDEs are …
Packj – Large-Scale Security Analysis Platform To Detect Malicious/Risky Open-Source Packages
Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for “risky” attributes that make them …
MrKaplan – Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by …
Smap – A Drop-In Replacement For Nmap Powered By Shodan.Io
Smap is a replica of Nmap which uses shodan.io’s free API for port scanning. It takes same command line arguments …
North Korean hackers target crypto experts with fake Coinbase job offers
North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has …
BlackStone – Pentesting Reporting Tool
BlackStone project or “BlackStone Project” is a tool created in order to automate the work of drafting and submitting a …
Pict – Post-Infection Collection Toolkit
This set of scripts is designed to collect a variety of data from an endpoint thought to be infected, to …
Peetch – An eBPF Playground
peetch is a collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections. Currently, …