- Austria
- https://ko-fi.com/R6R81S6SC
Hacking
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
A swiss army knife for pentesting networks
Find, verify, and analyze leaked credentials
📡 PoC auto collect from GitHub.
💻
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Miscellaneous tools for BloodHound
Collection of tools that reflect the network dimension into Bloodhound's data
A curated list of awesome BloodhoundAD resources
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)
visualising discord mutual friends in 3d space
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.
Th3Inspector 🕵️ Best Tool For Information Gathering 🔎
🆕 The Multi-Tool Web Vulnerability Scanner.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Extracts passwords from a KeePass 2.x database, directly from memory.
Jailbreak for A8 through A11, T2 devices, on iOS/iPadOS/tvOS 15.0, bridgeOS 5.0 and higher.
🐬 A collection of awesome resources for the Flipper Zero device.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of scripts for assessing Microsoft Azure security
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…