Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...
BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell ingestor. BloodHound...
Pymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify:...
Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an...
AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output...
StalkPhish is a tool created for searching into free OSINT databases for specific phishing kits URL. More, StalkPhish is designed to try...
A simple shell utility for encrypting and decrypting files using OpenSSL. Installation git clone https://github.com/nodesocket/cryptr.git ln -s "$PWD"/cryptr/cryptr.bash /usr/local/bin/cryptr Bash tab completion...
Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Video Demo Installation...
PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...
DNSMORPH is a domain name permutation engine, inspired by dnstwist. It is written in Go making for a compact and very fast...
Organizations and red teamers can utilize zBang to identify potential attack vectors and improve the security posture of the network. The results...
Network breaches happen. From mega-corps, to governments. From unsuspecting grandmas to well known security pros. This is (kinda) excusable. What isn’t excusable,...
Linux enumeration tools for pentesting and CTFs. This project was inspired by https://github.com/rebootuser/LinEnum and uses many of its tests. Unlike LinEnum, lse...
Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace. RedGhost Features Payloads Function to...
This tool is meant to encode and encrypt your javascript code/payloads. Features Number Calculating ASCII codes Caeser-Encryption Hex Encoding Octal encoding Binary...
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...
The Mozilla Enterprise Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers....
Terminus is a highly configurable terminal emulator for Windows, macOS and Linux Features Theming and color schemes Fully configurable shortcuts Split panes...
Rootkit Hunter is a scanner tool for Linux that scans for backdoors, rootkits and local exploits on your systems. Installs all dependencies...
Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security testing against...