BoomER | An Open Source Post-Exploitation Tool To Exploit Local Vulnerabilities

BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of targets with the objective

Read more

4CAN V2 | A Raspberry Pi Project To Help Find Vulnerabilities in Modern Cars

4CAN V2 is a Raspberry Pi project created by the Cisco team in order to test the security of cars

Read more

Salsa-tools | A Collaboration of Tools For a Reverse Shell on Steroids

Salsa-tools is a collection of three tools  programmed with C# used to take over a windows machine and bypass AV

Read more

Aquatone | An Open Source Domain Flyover Tool

Aquatone is a tool programmed by go-lang to inspect domains/check their status and also provide screenshots of the hosts it

Read more

Powershell-RAT | A Backdoor Tool to Extract Data via Gmail

Powershell-RAT is a Python and Powershell script tool that has been made to help a pen tester during red team engagements

Read more

A Malware Showcase | Understanding Malware With Python

Malware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only

Read more

DumpsterFire – A Tool That Generates Network Shenanigans to Facilitate Blue Team Training

DumpsterFire is an open-source tool made by blue team member to edit create and control dumpster payloads in order to

Read more

CMSeeK | An Open Source Content Management System Detection and Exploitation Tool

CMSeek is an open-source tool that analyzes the regex of websites in order to detect flaws and content management system

Read more
Do NOT follow this link or you will be banned from the site!