Hacking

bg
Tetanus - Mythic C2 Agent Targeting Linux And Windows Hosts Written In Rust

Tetanus - Mythic C2 Agent Targeting Linux And Windows Hosts...

Tetanus is a Windows and Linux C2 agent written in rust. Installation To install...

bg
Zphisher-GUI-Back_office - A Zphisher GUI Back-Office Plugin

Zphisher-GUI-Back_office - A Zphisher GUI Back-Office Plugin

DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous...

bg
Fb_Friend_List_Scraper - OSINT Tool To Scrape Names And Usernames From Large Friend Lists On Facebook, Without Being Rate Limited

Fb_Friend_List_Scraper - OSINT Tool To Scrape Names And...

OSINT tool to scrape names and usernames from large friend lists on Facebook, without...

bg
Kubeclarity - Tool For Detection And Management Of Software Bill Of Materials (SBOM) And Vulnerabilities Of Container Images And Filesystems

Kubeclarity - Tool For Detection And Management Of Software...

KubeClarity is a tool for detection and management of Software Bill Of Materials...

bg
DuplicateDump - Dumping LSASS With A Duplicated Handle From Custom LSA Plugin

DuplicateDump - Dumping LSASS With A Duplicated Handle...

DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementation...

bg
SSOh-No - User Enumeration And Password Spraying Tool For Testing Azure AD

SSOh-No - User Enumeration And Password Spraying Tool For...

This tool is designed to enumerate users, password spray and perform brute force...

bg
Heyserial - Programmatically Create Hunting Rules For Deserialization Exploitation With Multiple Keywords, Gadget Chains, Object Types, Encodings, And Rule Types

Heyserial - Programmatically Create Hunting Rules For Deserialization...

Programmatically create hunting rules for deserialization exploitation with multiple...

bg
Process_Overwriting - Yet Another Variant Of Process Hollowing

Process_Overwriting - Yet Another Variant Of Process Hollowing

Process Overwriting is a PE injection technique, closely related to Process Hollowing...

bg
RogueAssemblyHunter - Rogue Assembly Hunter Is A Utility For Discovering 'Interesting' .NET CLR Modules In Running Processes

RogueAssemblyHunter - Rogue Assembly Hunter Is A Utility...

Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules...

bg
BWASP - BoB Web Application Security Project

BWASP - BoB Web Application Security Project

The BoB Web Application Security Project (BWASP) is an open-source, analysis tool...

bg
BITB - Browser In The Browser (BITB) Templates

BITB - Browser In The Browser (BITB) Templates

Browser templates for Browser In The Browser (BITB) attack. More information: https://mrd0x.com/browser-in-the-browser-phishing-attack/...

bg
Rip Raw - Small Tool To Analyse The Memory Of Compromised Linux Systems

Rip Raw - Small Tool To Analyse The Memory Of Compromised...

Rip Raw is a small tool to analyse the memory of compromised Linux systems. It is...

bg
IOSSecuritySuite - iOS Platform Security And Anti-Tampering Swift Library

IOSSecuritySuite - iOS Platform Security And Anti-Tampering...

 iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering...

bg
Lupo - Malware IOC Extractor. Debugging Module For Malware Analysis Automation

Lupo - Malware IOC Extractor. Debugging Module For Malware...

Debugging module for Malware Analysis Automation For a step by step post on how...

bg
Osinteye - Username Enumeration And Reconnaisance Suite

Osinteye - Username Enumeration And Reconnaisance Suite

Username Enumeration And Reconnaisance Suite    Supported sites PyPI Github TestPypi...

bg
Requests-Ip-Rotator - A Python Library To Utilize AWS API Gateway's Large IP Pool As A Proxy To Generate Pseudo-Infinite IPs For Web Scraping And Brute Forcing

Requests-Ip-Rotator - A Python Library To Utilize AWS API...

A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate...

bg
Dora - Find Exposed API Keys Based On RegEx And Get Exploitation Methods For Some Of Keys That Are Found

Dora - Find Exposed API Keys Based On RegEx And Get Exploitation...

Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many...

bg
BackupOperatorToDA - From An Account Member Of The Group Backup Operators To Domain Admin Without RDP Or WinRM On The Domain Controller

BackupOperatorToDA - From An Account Member Of The Group...

If you compromise an account member of the group Backup Operators you can become...

Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.