Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a …

Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a …
ADReaper is a tool written in Golang which enumerate a Active Directory environment with LDAP queries within few seconds. Installation …
Office 365 and Exchange Enumeration It is widely known that OWA (Outlook Webapp) is vulnerable to time-based user enumeration attacks. …
EXOCET is superior to Metasploit’s “Evasive Payloads” modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit’s Evasion Payloads …
A rule-based tunnel in Go. Features Local HTTP/HTTPS/SOCKS server with authentication support VMess, Shadowsocks, Trojan, Snell protocol support for remote …
QueenSono tool only relies on the fact that ICMP protocol isn’t monitored. It is quite common. It could also been …
A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover? …
jsleak is a tool to identify sensitive data in JS files through regex patterns. Although it’s built for this, you …
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email …
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create …