Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan …
Forbidden-Buster – A Tool Designed To Automate Various Techniques In Order To Bypass HTTP 401 And 403 Response Codes And Gain Access To Unauthorized Areas In The System
Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes …
Crawlector – Threat Hunting Framework Designed For Scanning Websites For Malicious Objects
Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat hunting framework designed for scanning websites …
CryptoChat – Beyond Secure Messaging
Welcome to CryptChat – where conversations remain truly private. Built on the robust Python ecosystem, our application ensures that every …
Afuzz – Automated Web Path Fuzzing Tool For The Bug Bounty Projects
Afuzz is an automated web path fuzzing tool for the Bug Bounty projects. Afuzz is being actively developed by @rapiddns …
Red Canary Mac Monitor – An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system …
Elevationstation – Elevate To SYSTEM Any Way We Can! Metasploit And PSEXEC Getsystem Alternative
Stealing and Duplicating SYSTEM tokens for fun & profit! We duplicate things, make twin copies, and then ride away. You …
Dvenom – Tool That Provides An Encryption Wrapper And Loader For Your Shellcode
Double Venom (DVenom) is a tool that helps red teamers bypass AVs by providing an encryption wrapper and loader for …
WebSecProbe – Web Security Assessment Tool, Bypass 403
A cutting-edge utility designed exclusively for web security aficionados, penetration testers, and system administrators. WebSecProbe is your advanced toolkit for …
NetworkAssessment – With Wireshark Or TCPdump, You Can Determine Whether There Is Harmful Activity On Your Network Traffic That You Have Recorded On The Network You Monitor
The Network Compromise Assessment Tool is designed to analyze pcap files to detect potential suspicious network traffic. This tool focuses …