This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support. Run Setting up NS records on our domain:...
SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once...
Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by...
AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a...
XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important...
DVR-Exploiter a Bash Script Program Exploit The DVR’s Based on CVE-2018-999. [*] Exploit Title: DVR Credentials Exposed [*] Date: 09/04/2018 [*] Exploit...
A command-line tool for querying Troy Hunt’s Have I been pwned ? service using the hibp Node.js module. Pwned Installation Download and...
The main impetus for DbgShell is that it’s just waaaay too hard to automate anything in the debugger. There are facilities today to assist...
Vulners Bot is a Telegram interface for popular vulnerability database. It gives you availability of searching for exploits, tools, patches and many...
Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool...
Leaked? is A Checking tool for Hash codes and Passwords leaked, use API from @webtobesocial.Leaked? can work in any OS if they...
PacketWhisper – Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name Servers or...
Just a simple (poorly written) Python script that aimlessly “browses” the internet by starting at pre-defined rootURLs and randomly “clicking” links on...
Spykeyboard is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once...
Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root...
Bashark aids Pentesters and Security Researchers during the post-exploitation phase of security audits. Usage To launch Bashark on compromised host, simply source...
IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed...
Evilginx is an attack framework for setting up phishing pages. Instead of serving templates of sign-in pages lookalikes, Evilginx becomes a relay between...
WTF is a personal terminal-based dashboard utility, designed for displaying infrequently-needed, but very important, daily data. WTF Installation There are two ways...
ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in...
Gitrob is a command line device which will help organizations and security professionals discover delicate data lingering in publicly accessible recordsdata on...