Pyrit – The Famous WPA Precomputed Cracker
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power of Multi-Core CPUs and other […]
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power of Multi-Core CPUs and other […]
ROPDump is a tool for analyzing binary executables to identify potential Return-Oriented Programming (ROP) gadgets, as well as detecting potential buffer overflow and memory leak
Install To install headerpwn, run the following command: go install github.com/devanshbatham/headerpwn@v0.0.3 Usage headerpwn allows you to test various headers on a target URL and analyze
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended
Reaper is a proof-of-concept designed to exploit BYOVD (Bring Your Own Vulnerable Driver) driver vulnerability. This malicious technique involves inserting a legitimate, vulnerable driver into
EvilSlackbot A Slack Attack Framework for conducting Red Team and phishing exercises within Slack workspaces. Disclaimer This tool is intended for Security Professionals only. Do
EvilSlackbot – A Slack Bot Phishing Framework For Red Teaming Exercises Read More »
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. What is Docker? Docker is an
ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again. Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/Imperius Download ModTracer
ModTracer – ModTracer Finds Hidden Linux Kernel Rootkits And Then Make Visible Again Read More »
Tool for obfuscating PowerShell scripts written in Go. The main objective of this program is to obfuscate PowerShell code to make its analysis and detection
Evade EDR’s the simple way, by not touching any of the API’s they hook. Theory I’ve noticed that most EDRs fail to scan scripting files,
BYOSI – Evade EDR’s The Simple Way, By Not Touching Any Of The API’s They Hook Read More »
A make an LKM rootkit visible again. This tool is part of research on LKM rootkits that will be launched. It involves getting the memory
Imperius – Make An Linux Kernel Rootkit Visible Again Read More »