While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a program to function, it …
NixImports – A .NET Malware Loader, Using API-Hashing To Evade Static Analysis
A .NET malware loader, using API-Hashing and dynamic invoking to evade static analysis How does it work? NixImports uses my …
Columbus-Server – API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features
Columbus Project is an API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features. Columbus returned 638 …
Xcrawl3R – A CLI Utility To Recursively Crawl Webpages
xcrawl3r is a command-line interface (CLI) utility to recursively crawl webpages i.e systematically browse webpages’ URLs and follow links to …
Chaos – Origin IP Scanning Utility Developed With ChatGPT
chaos is an ‘origin’ IP scanner developed by RST in collaboration with ChatGPT. It is a niche utility with an …
Xurlfind3R – A CLI Utility To Find Domain’S Known URLs From Curated Passive Online Sources
xurlfind3r is a command-line interface (CLI) utility to find domain’s known URLs from curated passive online sources. Features Fetches URLs …
Browser-password-stealer – Get All The Saved Passwords, Credit Cards And Bookmarks From Chromium Based Browsers Supports Chromium 80 And Above!
This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and …
AiCEF – An AI-assisted cyber exercise content generation framework using named entity recognition
AiCEF is a tool implementing the accompanying framework [1] in order to harness the intelligence that is available from online …
Upload_Bypass – File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques Covered In Hacktricks
Upload_Bypass is a powerful tool designed to assist Pentesters and Bug Hunters in testing file upload mechanisms. It leverages various …
IMDShift – Automates Migration Process Of Workloads To IMDSv2 To Avoid SSRF Attacks
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration …