Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …

Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …
Payload Loader With Evasion Features. Features: no crt functions imported indirect syscalls using HellHall api hashing using CRC32 hashing algorithm …
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library Download Releases page Features Header information from: MSDOS Header, …
Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …
By Cas van Cooten (@chvancooten), with special thanks to some awesome folks: Fabian Mosch (@S3cur3Th1sSh1t) for sharing dynamic invocation implementation …
The script FindUncommonShares.py is a Python equivalent of PowerView‘s Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows …
The plugin is created to help automated scanning using Burp in the following scenarios: Access/Refresh token Token replacement in XML,JSON …
Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes (in 22000 hashcat format), MGT …
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability …
CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and …