Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to...
DNSlivery allows to deliver files to a target using DNS as the transport protocol and has been inspired by PowerDNS and Joff...
Beemka shows how vulnerabilities in the Electron Framework could allow an attacker to inject malicious code inside a legitimate application without raising...
One of the most useful tools for gathering information on someone, business, a domain, ip address and websites. Usage Short Form Long...
Network Security tools for Penetration testing is more often used by security industries to test the vulnerabilities in network and applications. Here...
CardPwn Searches for the breached credit card details avaliable on the following 17 Websites:- * cl1p.net * dpaste * dumpz.org * hastebin...
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic....
Kubolt is simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers Why? Sometimes, the kubelet port 10250 is...
An extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and can fit seamlessly into...
Sputnik is an extension to quickly and easily search IPs, Domains, File Hashes, and URLs using free Open Source Intelligence (OSINT) resources....
Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To find out how to access...
Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. What is DLL hijacking ? Windows...
A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. Evil limiter employs ARP...
Graffiti is a tool to generate obfuscated oneliners to aid in penetration testing situations. Graffiti accepts the following languages for encoding: Python...
Locate and identify website visitors by IP address. IPfinder offers one of the leading IP to geolocation APIs and global IP database...
Stealing desktop telegrams has never been so easy. Advanced Telegram Desktop Session Hijacker. Set the email and sender details of the sender...
Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a...
Doxing (also “doxxing”, or “d0xing”, a word derived from “documents”, or “docs”) consists in tracing and gathering information about someone using sources...
PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you...
A simple one click to install and download, Utools2 toolkit contains some of the best hacking tools used and compiled into one...
Various PowerShell scripts that may be useful during a red team exercise. The repo includes the following scripts: Red Team Powershell Scripts...