Hacking

bg
Nanodump - A Crappy LSASS Dumper With No ASCII Art

Nanodump - A Crappy LSASS Dumper With No ASCII Art

A flexible tool that creates a minidump of the LSASS process. 1. Features It uses...

bg
Moonwalk - Cover Your Tracks During Linux Exploitation By Leaving Zero Traces On System Logs And Filesystem Timestamps

Moonwalk - Cover Your Tracks During Linux Exploitation...

Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero...

bg
Pybatfish - Python Client For Batfish (Network Configuration Analysis Tool)

Pybatfish - Python Client For Batfish (Network Configuration...

Pybatfish is a Python client for Batfish.  What is Batfish? Batfish is a network...

bg
FirmWire -b Full-System Baseband Firmware Emulation Platform For Fuzzing, Debugging, And Root-Cause Analysis Of Smartphone Baseband Firmwares

FirmWire -b Full-System Baseband Firmware Emulation Platform...

FirmWire is a full-system baseband firmware analysis platform that supports Samsung...

bg
LeakedHandlesFinder - Leaked Windows Processes Handles Identification Tool

LeakedHandlesFinder - Leaked Windows Processes Handles...

Leaked Windows processes handles identification tool. Useful for identify new LPE...

bg
LDAPFragger - Command And Control Tool That Enables Attackers To Route Cobalt Strike Beacon Data Over LDAP

LDAPFragger - Command And Control Tool That Enables Attackers...

LDAPFragger is a Command and Control tool that enables attackers to route Cobalt...

bg
Cliam - Multi Cloud IAM Permissions Enumeration Tool

Cliam - Multi Cloud IAM Permissions Enumeration Tool

Multi cloud iam permissions enumeration tool. Currently covers: AWS GCP [TODO] Azure...

bg
Graphql-Threat-Matrix - GraphQL Threat Framework Used By Security Professionals To Research Security Gaps In GraphQL Implementations

Graphql-Threat-Matrix - GraphQL Threat Framework Used By...

Why graphql-threat-matrix? graphql-threat-matrix was built for bug bounty hunters,...

bg
Malicious-Pdf -  Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality

Malicious-Pdf - Generate A Bunch Of Malicious Pdf Files...

Generate ten different malicious pdf files with phone-home functionality. Can be...

bg
PEzor-Docker - With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!

PEzor-Docker - With The Help Of This Docker Image, You...

With the help of this kali linux image, you can easily access PEzor on your system!...

bg
Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks

Email-Prediction-Asterisks - Script That Allows You To...

Email prediction asterisks is a script that allows you to identify the emails hidden...

bg
GoSH - Golang Reverse/Bind Shell Generator

GoSH - Golang Reverse/Bind Shell Generator

Golang reverse/bind shell generator. Description This tool generates a Go binary...

bg
Zi - A Swiss Army Knife for Zsh - Unix Shell

Zi - A Swiss Army Knife for Zsh - Unix Shell

A Swiss Army Knife for Zsh - Unix Shell.RoadmapSee the open issues for a list of...

bg
CVE-Tracker - With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs

CVE-Tracker - With The Help Of This Automated Script, You...

With the help of this automated script, you will never lose track of newly released...

bg
AutoResponder - Carbon Black Response IR Tool

AutoResponder - Carbon Black Response IR Tool

What is it? AutoResponder is a tool aimed to help people to carry out their Incident...

bg
Spring4Shell-POC - Dockerized Spring4Shell (CVE-2022-22965) PoC Application And Exploit

Spring4Shell-POC - Dockerized Spring4Shell (CVE-2022-22965)...

This is a dockerized application that is vulnerable to the Spring4Shell vulnerability...

bg
Spring4Shell-Poc - Spring Core RCE 0-day Vulnerability

Spring4Shell-Poc - Spring Core RCE 0-day Vulnerability

Description of the vulnerability: https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html...

bg
How Ethical Hackers Help A.S. Watson Address Digital Risk

How Ethical Hackers Help A.S. Watson Address Digital Risk

We recently met with A.S. Watson’s Chief Information Security Officer (CISO), Feliks...

bg
Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap

Announcing the HackerOne 2022 Attack Resistance Report:...

Today, HackerOne published The 2022 Attack Resistance Report: A HackerOne Security...

bg
How Wix Improves Their Security Posture with Ethical Hackers

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat...

Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.