Tutorials

Procrustes - A Bash Script That Automates The Exfiltration Of Data Over Dns In Case We Have A Blind Command Execution On A Server Where All Outbound Connections Except DNS Are Blocked

Procrustes - A Bash Script That Automates The Exfiltration...

A bash script that automates the exfiltration of data over dns in case we have a...

uEmu - Tiny Cute Emulator Plugin For IDA Based On Unicorn.

uEmu - Tiny Cute Emulator Plugin For IDA Based On Unicorn.

uEmu is a tiny cute emulator plugin for IDA based on unicorn engine. Supports following...

Ciphertext can be altered. Sign and Verify messages or get fucked

Ciphertext can be altered. Sign and Verify messages or...

A reminder to use the Sign and Verify features of PGP to prevent attacks that most...

packetStrider - A Network Packet Forensics Tool For SSH

packetStrider - A Network Packet Forensics Tool For SSH

packetStrider for SSH is a packet forensics tool that aims to provide valuable insight...

Chameleon - Customizable Honeypots For Monitoring Network Traffic, Bots Activities And Username\Password Credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres And MySQL)

Chameleon - Customizable Honeypots For Monitoring Network...

Customizable honeypots for monitoring network traffic, bots activities and username\password...

Kubestriker - A Blazing Fast Security Auditing Tool For Kubernetes

Kubestriker - A Blazing Fast Security Auditing Tool For...

Kubestriker performs numerous in depth checks on kubernetes infra to identify the...

CertEagle - Asset monitoring utility using real time CT log feeds

CertEagle - Asset monitoring utility using real time CT...

In Bugbounties “If you are not first , then you are last” there is no such thing...

PyBeacon - A Collection Of Scripts For Dealing With Cobalt Strike Beacons In Python

PyBeacon - A Collection Of Scripts For Dealing With Cobalt...

PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic....

SharpSphere - .NET Project For Attacking vCenter

SharpSphere - .NET Project For Attacking vCenter

SharpSphere gives red teamers the ability to easily interact with the guest operating...

Teatime - An RPC Attack Framework For Blockchain Nodes

Teatime - An RPC Attack Framework For Blockchain Nodes

Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations...

Fake-Sms - A Simple Command Line Tool Using Which You Can Skip Phone Number Based SMS Verification By Using A Temporary Phone Number That Acts Like A Proxy

Fake-Sms - A Simple Command Line Tool Using Which You Can...

A simple command line tool using which you can skip phone number based SMS verification...

Threatspec - Continuous Threat Modeling, Through Code

Threatspec - Continuous Threat Modeling, Through Code

Threatspec is an open source project that aims to close the gap between development...

OWASP ASST (Automated Software Security Toolkit) - A Novel Open Source Web Security Scanner

OWASP ASST (Automated Software Security Toolkit) - A Novel...

OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security...

Halogen - Automatically Create YARA Rules From Malicious Documents

Halogen - Automatically Create YARA Rules From Malicious...

Halogen is a tool to automate the creation of yara rules against image files embedded...

Kali Linux 2021.1 - Penetration Testing and Ethical Hacking Linux Distribution

Kali Linux 2021.1 - Penetration Testing and Ethical Hacking...

Time for another Kali Linux release! – Kali Linux 2021.1. This release has various...

WdToggle - A Beacon Object File (BOF) For Cobalt Strike Which Uses Direct System Calls To Enable WDigest Credential Caching

WdToggle - A Beacon Object File (BOF) For Cobalt Strike...

A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls...

Gargamel - A Forensic Evidence Acquirer

Gargamel - A Forensic Evidence Acquirer

A Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open...

Pillager - Filesystems For Sensitive Information With Go

Pillager - Filesystems For Sensitive Information With Go

Pillager is designed to provide a simple means of leveraging Go's strong concurrency...

Gatekeeper - First Open-Source DDoS Protection System

Gatekeeper - First Open-Source DDoS Protection System

Gatekeeper is the first open source DoS protection system. It is designed to scale...

CornerShot - Amplify Network Visibility From Multiple POV Of Other Hosts

CornerShot - Amplify Network Visibility From Multiple POV...

In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and...

ScareCrow - Payload Creation Framework Designed Around EDR Bypass

ScareCrow - Payload Creation Framework Designed Around...

If you want to learn more about the techniques utlized in this framework please...

APT-Hunter - Threat Hunting Tool For Windows Event Logs Which Made By Purple Team Mindset To Provide Detect APT Movements Hidden In The Sea Of Windows Event Logs To Decrease The Time To    Uncover Suspicious Activity

APT-Hunter - Threat Hunting Tool For Windows Event Logs...

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team...

BugBountyScanner - A Bash Script And Docker Image For Bug Bounty Reconnaissance

BugBountyScanner - A Bash Script And Docker Image For Bug...

A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless...

BlackMamba - C2/post-exploitation Framework

BlackMamba - C2/post-exploitation Framework

BlackMamba is a multi client C2/post exploitation framework with some spyware features....

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here