SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop to encodeRead more
TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work productivity. We know how muchRead more
GhostShell is a Malware indetectable, with AV bypass techniques, anti-disassembly, etc. In this malware, are used some techniques to try bypass the AVs, VMs, andRead more
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell code and binaries. This couldRead more
The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network centric applications such as: IPRead more
Install pip install fsociety Update pip install –upgrade fsociety Usage usage: fsociety [-h] [-i] [-s] A Penetration Testing Framework optional arguments: -h, –help show thisRead more
Bing-ip2hosts is a Bing.com web scraper that discovers hostnames by IP address. Bing is the flagship Microsoft search engine formerly known as MSN Search andRead more
Read the license before using any part from this code 🙂Malicious DLL (Win Reverse Shell) generator for DLL Hijacking Features: Reverse TCP Port Forwarding usingRead more
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.Axiom right now is perfect for teamsRead more
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords,Read more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!