Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And …
LSMS – Linux Security And Monitoring Scripts
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events …
Firefly – Black Box Fuzzer For Web Applications
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing …
BackupOperatorToolkit – The BackupOperatorToolkit Contains Different Techniques Allowing You To Escalate From Backup Operator To Domain Admin
Usage The BackupOperatorToolkit (BOT) has 4 different mode that allows you to escalate from Backup Operator to Domain Admin.Use “runas.exe …
Killer – Is A Tool Created To Evade AVs And EDRs Or Security Tools
It’s a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Module Stomping …
Fiber – Using Fibers To Run In-Memory Code In A Different And Stealthy Way
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the …
Kali Linux 2023.2 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2023.2. This release has various impressive updates. Source : KitPloit – …
C2-Hunter – Extract C2 Traffic
C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time. The …
Bypass-Sandbox-Evasion – Bypass Malware Sandbox Evasion Ram Check
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether …
PythonMemoryModule – Pure-Python Implementation Of MemoryModule Technique To Load Dll And Unmanaged Exe Entirely From Memory
“Python memory module” AI generated pic – hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe …