CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS exfiltration,Read more
Want to come up with a smooth user flow diagram for your website or app? Then find out about the best user flow and flowchartRead more
Racketeer Project – Ransomware emulation toolkit The goal of this project is to provide a way for teams to simulate and test detection of commonRead more
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works with more complex obfuscations thanRead more
Terra guard’s goal is to be simple to create and destroy your own VPN service using Wire Guard. Prerequisites Terraform >= 1.0.0 Ansible >= 2.10.5 HowRead more
Mobile Verification Toolkit Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identifyRead more
Azure JSON Web Token (“JWT”) Manipulation Toolset Azure access tokens allow you to authenticate to certain endpoints as a user who signs in with aRead more
by do son · Published July 27, 2021 · Updated July 27, 2021 PickleC2 PickleC2 is a post-exploitation and lateral movements framework PickleC2 is aRead more
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security projects, from planning, to implementationRead more
Created by David French (@threatpunter) at Elastic Security Dorothy is a tool to help security teams test their monitoring and detection capabilities for their OktaRead more
Cobalt Strike BOF – Inject AMSI Bypass Cobalt Strike Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection. Running inject-amsiBypassRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!