hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it is …
VLANPWN – VLAN Attacks Toolkit
VLAN attacks toolkit DoubleTagging.py – This tool is designed to carry out a VLAN Hopping attack. As a result of …
RedGuard – C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check
Tool introduction RedGuard is a derivative work of the C2 facility pre-flow control technology. It has a lighter design, efficient …
Chisel-Strike – A .NET XOR Encrypted Cobalt Strike Aggressor Implementation For Chisel To Utilize Faster Proxy And Advanced Socks5 Capabilities
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities. Why write …
NimGetSyscallStub – Get Fresh Syscalls From A Fresh Ntdll.Dll Copy
Get fresh Syscalls from a fresh ntdll.dll copy. This code can be used as an alternative to the already published …
OffensiveVBA – Code Execution And AV Evasion Methods For Macros In Office Documents
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and …
Faraday Community – Open Source Penetration Testing and Vulnerability Management Platform
Faraday was built from within the security community, to make vulnerability management easier and enhance our work. What IDEs are …
Packj – Large-Scale Security Analysis Platform To Detect Malicious/Risky Open-Source Packages
Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for “risky” attributes that make them …
MrKaplan – Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by …
Smap – A Drop-In Replacement For Nmap Powered By Shodan.Io
Smap is a replica of Nmap which uses shodan.io’s free API for port scanning. It takes same command line arguments …