
PwnAuth
#Security Testing#Offensive Security
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
PwnAuth is an open-source tool
PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses
It provides a flexible framework
It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms.
With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP
The tool also supports token
The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs.
PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed
This makes it an ideal
This makes it an ideal tool for advanced penetration testing and red teaming exercises.
Other AI Tools

RTFSig
A simple JWT token brute force cracker
Details
Visit site

Reversing With Lena (Tutorials)
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Details
Visit site

Rootkit Hunter
Define and validate YARA rule metadata with CCCS YARA Specification.
Details
Visit site

ROPgadget Tool
A Scriptable Android Debugger for reverse engineers and developers.
Details
Visit site

Ropper
Automatic analysis of malware behavior using machine learning.
Details
Visit site

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Details
Visit site