Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit designed to map out an organization’s entire …


Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit designed to map out an organization’s entire …

PANO is a powerful OSINT investigation platform that combines graph visualization, timeline analysis, and AI-powered tools to help you uncover …

Instagram Brute Force CPU/GPU Supported 2024 (Use option 2 while running the script.) (Option 1 is on development) (Chrome should …

Evade EDR’s the simple way, by not touching any of the API’s they hook. Theory I’ve noticed that most EDRs …

A proof-of-concept User-Defined Reflective Loader (UDRL) which aims to recreate, integrate, and enhance Cobalt Strike’s evasion features! Contributors: UDRL Usage …

NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to …

Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating …

Reaper is a proof-of-concept designed to exploit BYOVD (Bring Your Own Vulnerable Driver) driver vulnerability. This malicious technique involves inserting …

A collection of fully-undetectable process injection techniques abusing Windows Thread Pools. Presented at Black Hat EU 2023 Briefings under the …

Package go-secdump is a tool built to remotely extract hashes from the SAM registry hive as well as LSA secrets …