Exploits

PoisonApple - macOS Persistence Tool

Command-line tool to perform various persistence mechanism techniques on macOS....

NtHiM - Super Fast Sub-domain Takeover Detection

NtHiM - Super Fast Sub-domain Takeover Detection

NtHiM - Super Fast Sub-domain Takeover Detection Installation Method 1: Using Pre-compiled...

Redcloud - Automated Red Team Infrastructure Deployement Using Docker

Redcloud - Automated Red Team Infrastructure Deployement...

Redcloud is a powerful and user-friendly toolbox for deploying a fully featured...

InveighZero - Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 Spoofer/Man-In-The-Middle Tool

InveighZero - Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 Spoofer/Man-In-The-Middle...

InveighZero is a C# LLMNR/NBNS/mDNS/DNS/DHCPv6 spoofer and man-in-the-middle tool...

Max - Maximizing BloodHound

Max - Maximizing BloodHound

Maximizing BloodHound. Description New Release: dpat - The BloodHound Domain Password...

Android_Hid - Use Android As Rubber Ducky Against Another Android Device

Android_Hid - Use Android As Rubber Ducky Against Another...

Use Android as Rubber Ducky against another Android device HID attack using Android...

Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets

Columbo - A Computer Forensic Analysis Tool Used To Simplify...

Columbo is a computer forensic analysis tool used to simplify and identify specific...

ThreatMapper - Identify Vulnerabilities In Running Containers, Images, Hosts And Repositories

ThreatMapper - Identify Vulnerabilities In Running Containers,...

The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload...

Scylla - The Simplistic Information Gathering Engine | Find Advanced Information On A Username, Website, Phone Number, Etc...

Scylla - The Simplistic Information Gathering Engine |...

Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced...

ClearURLs - An Add-On Based On The New WebExtensions Technology And Will Automatically Remove Tracking Elements From URLs To Help Protect Your Privacy

ClearURLs - An Add-On Based On The New WebExtensions Technology...

ClearURLs is an add-on based on the new WebExtensions technology and is optimized...

KICS - Find Security Vulnerabilities, Compliance Issues, And Infrastructure Misconfigurations Early In The Development Cycle Of Your Infrastructure-As-Code

KICS - Find Security Vulnerabilities, Compliance Issues,...

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations...

Boomerang - A Tool To Expose Multiple Internal Servers To Web/Cloud

Boomerang - A Tool To Expose Multiple Internal Servers...

Boomerang is a tool to expose multiple internal servers to web/cloud using HTTP+TCP...

Search-That-Hash - Searches Hash APIs To Crack Your Hash Quickly, If Hash Is Not Found Automatically Pipes Into HashCat

Search-That-Hash - Searches Hash APIs To Crack Your Hash...

The Fastest Hash Cracking System pip3 install search-that-hash && sth Tired of going...

CallObfuscator - Obfuscate Specific Windows Apis With Different APIs

CallObfuscator - Obfuscate Specific Windows Apis With Different...

Obfuscate (hide) the PE imports from static/dynamic analysis tools. Theory This's...

Obfuscation_Detection - Collection Of Scripts To Pinpoint Obfuscated Code

Obfuscation_Detection - Collection Of Scripts To Pinpoint...

Automatically detect control-flow flattening and other state machines Author: Tim...

Smogcloud - Find Cloud Assets That No One Wants Exposed

Smogcloud - Find Cloud Assets That No One Wants Exposed

Find exposed AWS cloud assets that you did not know you had. A comprehensive asset...

Gitrecon - OSINT Tool To Get Information From A Github Profile And Find GitHub User'S Email Addresses Leaked On Commits

Gitrecon - OSINT Tool To Get Information From A Github...

OSINT tool to get information from a github profile and find GitHub user's email...

Kraker - Distributed Password Brute-Force System That Focused On Easy Use

Kraker - Distributed Password Brute-Force System That Focused...

Kraker is a distributed password brute-force system that allows you to run and manage...

CTF-Party - A Ruby Library To Enhance And Speed Up Script/Exploit Writing For CTF Players

CTF-Party - A Ruby Library To Enhance And Speed Up Script/Exploit...

A library to enhance and speed up script/exploit writing for CTF players (or security...

Godehashed - Tool That Uses The Dehashed.Com API To Search For Compromised Assets

Godehashed - Tool That Uses The Dehashed.Com API To Search...

A golang tool that uses the dehashed.com API to search for compromised assets. Results...

ProxyLogon - PoC Exploit for Microsoft Exchange

ProxyLogon - PoC Exploit for Microsoft Exchange

PoC Exploit for Microsoft Exchange Launche Original PoC: https://github.com/testanull...

Subcert - An Subdomain Enumeration Tool, That Finds All The Subdomains From Certificate Transparency Logs

Subcert - An Subdomain Enumeration Tool, That Finds All...

Subcert is a subdomain enumeration tool, that finds all the valid subdomains from...

Vajra - A Highly Customi zable Target And Scope Based Automated Web Hacking Framework To Automate Boring Recon Tasks

Vajra - A Highly Customi zable Target And Scope Based Automated...

An automated web hacking framework for web applications Detailed insight about Vajra...

AnonX - An Encrypted File Transfer Via AES-256-CBC

AnonX - An Encrypted File Transfer Via AES-256-CBC

An Encrypted File transfer via AES-256-CBC AnonX is an encrypted file uploader and...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here