Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more …
ELFXtract – An Automated Analysis Tool Used For Enumerating ELF Binaries
ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed …
Nanobrok – Web Service For Control And Protect Your Android Device Remotely
Web Service write in Python for control and protect your android device remotely. The official app can be found on …
Redherd Framework -A Collaborative And Serverless Framework For Orchestrating A Geographically Distributed Group Of Assets
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of conducting simulating complex …
Whispers – Identify Hardcoded Secrets In Static Structured Text
“My little birds are everywhere, even in the North, they whisper to me the strangest stories.” – Lord Varys Whispers …
ThreatBox – A Standard And Controlled Linux Based Attack Platform
ThreatBox is a standard and controlled Linux based attack platform. I’ve used a version of this for years. It started …
The Government of Taiwan Faces 5 Million Cyber Threats Daily
A report from government agencies in Taiwan indicates that the country faces over five million cyber probes and attacks daily. …
Stacs – Static Token And Credential Scanner
Static Token And Credential Scanner What is it? STACS is a YARA powered static credential scanner which suports binary file …
Registry-Recon – Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon. Author: Jess Hires Description As a red-team practitioner, we are often using …
Nosferatu – Lsass NTLM Authentication Backdoor
Lsass NTLM Authentication Backdoor How it Works First, the DLL is injected into the lsass.exe process, and will begin hooking …