LinEnum View LinEnum
Generate a variety of suspect actions detected by Falco rulesets.
Offensive security testing uncovers vulnerabilities through simulated attacks.
Generate a variety of suspect actions detected by Falco rulesets.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.
Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.
Generate a variety of suspect actions detected by Falco rulesets.
GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.
A comprehensive .NET post-exploitation library designed for advanced security testing.
Repository of tools for testing iPhone messaging by Project Zero
CTF toolkit for rapid exploit development and prototyping.
Local pentest lab using docker compose to spin up victim and attacker services.
FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.
Comprehensive host-survey tool for security checks in C#.
Local pentest lab using docker compose to spin up victim and attacker services.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
A tool for mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Chameleon aids in evading proxy categorization to bypass internet filters.
A modular, menu-driven tool for building repeatable, time-delayed, distributed security events.
CTF toolkit for rapid exploit development and prototyping.
XAHICO Web Platform is a cloud-based solution for vulnerability detection, penetration testing, and adversary simulation, accessible through web browsers and suitable for various user levels.
Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset