LiveTargetsFinder Generates lists of live hosts and URLs for targeting, automating the usage of Massdns, Masscan, and nmap to filter out unreachable...
Being able to hide or continually rotate the source IP address when making web calls can be difficult or expensive. A number...
Predator – Anti-Automation System Predator is a prototype web application designed to demonstrate anti-crawling, anti-automation & bot detection techniques. It can be...
Tooling that automates your social media interactions to collect posts, photos, videos, friends, followers and much more on Facebook. FeaturesA bot which...
Given that we are almost always connected to the Internet on a daily basis, cybersecurity is a growing concern among all of...
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command. The beauty of this tool is that it doesn’t perform authentication...
WhatsDump Extract WhatsApp private key from any Android device (Android 7+ supported). This tool spawns a clean Android 6 emulator and attempts...
This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, Proxy...
PR-DNSd Passive-Recursive DNS daemon. What does it do? Use cases run as localhost DNS service, to fix your netstat/tcpview/lsof, etc. output...
Cross-platform backdoor using dns txt records. What is ddor?ddor is a cross platform light weight backdoor that uses txt records to execute...
PivotSuite PivotSuite: Hack The Hidden Network – A Network Pivoting Toolkit It is a portable, platform-independent and powerful network pivoting toolkit, Which...
In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy...
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from...
SQL InjectionIn this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds...
According to the Insurance Bureau of Canada, car theft is a major problem that is occurring all across the world and costs...
Blind SQL Injection Tool with Golang.UsageDownload andor.go and go to the folder where the file andor.go located. And type this to command...
Seeker Introduction Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy. Seeker Hosts a fake website on Apache Server and uses Ngrok to generate an...
DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing. PurposeThis lab has been designed...
Scavenger Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA...
[*] RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0. RedPeanut code execution...
linux-smart-enumeration Linux enumeration tools for pentesting and CTFs This project was inspired by LinEnum and uses many of its tests. Unlike LinEnum, lse tries...