With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in daily penetration testing and security
Read more
With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in daily penetration testing and security
Read morePYTMIPE (PYthon library for Token Manipulation and Impersonation for Privilege Escalation) is a Python 3 library for manipulating Windows tokens and managing impersonations in order
Read moreenum4linux-ng.py is a rewrite of Mark Lowe’s (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating information from Windows and Samba
Read moreOnionSearch is a Python3 script that scrapes urls on different “.onion” search engines. Prerequisite Python 3 Currently supported Search engines ahmia darksearchio onionland notevil darksearchenginer
Read moreAn interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server. Installation RedShell runs on Python 3.
Read moreThe Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn’t be able to get from just looking at
Read moreRoutopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP) and First-Hop Redundancy Protocols (FHRP).
Read moreMacC2 is a macOS post exploitation tool written in python that uses Objective C calls or python libraries as opposed to command line executions. The
Read moreYet Another Golang Binary Parser For IDAPro NOTE: This master branch is written in Python2 for IDAPython, and tested only on IDA7.2/IDA7.0. If you use
Read moreFinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount
Read moreBased on pywebfuzz, Py3webfuzz is a Python3 module to assist in the identification of vulnerabilities in web applications, Web Services through brute force, fuzzing and
Read more