In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning …
Enumy – Linux Post Exploitation Privilege Escalation Enumeration
Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation …
ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending
ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you …
DroidFiles – Get Files From Android Directories
Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, …)Legal disclaimer:Usage of DroidFiles for attacking targets …
MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory
Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by …
RepoPeek – A Python Script To Get Details About A Repository Without Cloning It
RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using …
OhMyQR – Hijack Services That Relies On QR Code Authentication
QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all …
Jaeles v0.9 – The Swiss Army Knife For Automated Web Application Testing
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled …
AutoRDPwn v5.1 – The Shadow Attack Framework
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …
Locator – Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)
Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to obfuscate the Serveo link.Legal disclaimer:Usage of …