Searches an AWS environment looking for secrets, by enumerating environment variables and source code. This tool allows quick enumeration over …
EDRHunt – Scan Installed EDRs And AVs On Windows
EDRHunt scans Windows services, drivers, processes, registry for installed EDRs (Endpoint Detection And Response). Read more about EDRHunt here. Install …
Instaloctrack – An Instagram OSINT Tool To Collect All The Geotagged Locations Available On An Instagram Profile In Order To Plot Them On A Map, And Dump Them In A JSON
A tool to scrape geotagged locations on Instagram profiles. Output in JSON & interactive map. TL;DR : ascineema, video of the project …
Espionage – A Network Packet And Traffic Interceptor For Linux. Spoof ARP And Wiretap A Network
Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows …
SentryPeer – A Distributed Peer To Peer List Of Bad Actor IP Addresses And Phone Numbers Collected Via A SIP Honeypot
A distributed list of bad actor IP addresses and phone numbers collected via a SIP Honeypot. Introduction This is basically …
SQLRecon – A C# MS SQL Toolkit Designed For Offensive Reconnaissance And Post-Exploitation
A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the …
Heaptrace – Helps Visualize Heap Operations For Pwn And Debugging
heaptrace is a heap debugger for tracking glibc heap operations in ELF64 (x86_64) binaries. Its purpose is to help visualize …
Phant0m – Windows Event Log Killer
Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process …
Ipsourcebypass – This Python Script Can Be Used To Bypass IP Source Restrictions Using HTTP Headers
This Python script can be used to bypass IP source restrictions using HTTP headers. Features 17 HTTP headers. Multithreading. JSON …
Bluffy – Convert Shellcode Into Different Formats!
Bluffy is a utility which was used in experiments to bypass Anti-Virus products (statically) by formatting shellcode into realistic looking …