Easier network scanning with NetAss2 (Network Assessment Assistance Framework). Make it easy for Pentester to do penetration testing on network. Dependencies nmap...
Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list...
IMPORTANTWhen using source or by downloading the code directly from the repository, it is important to run the database upgrade script if...
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated....
threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related...
PowerShell Script to perform a quick AD audit _____ ____ _____ _ _ _| _ | | _ |_ _ _| |_|...
SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver...
DFIRtriage is a tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to...
vulnerability scanner tool is using nmap and nse scripts to find vulnerabilitiesThis tool puts an additional value into vulnerability scanning with nmap....
Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally...
Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool....
Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an...
EyeWitness is designed to take screenshots of websites provide some server header info, and identify default credentials if known.EyeWitness is designed to...
Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection of github...
HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and...
XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and...
Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To find out how to access...
Using Metasploit is not an difficult thing anymore. Because there are many resources that are available over the internet. Which tells usage...
Newly discovered Malware called “Roaming Mantis” infiltrate the Android smartphones using a technique known as DNS hijacking and steal the sensitive information...