RecoverPy - Interactively Find And Recover Deleted Or Overwritten Files From Your Terminal RecoverPy - Interactively Find And Recover Deleted Or Overwritten Files From Your Terminal Reviewed by Zion3R on 5:30 PM Rating: 5
Bluffy - Convert Shellcode Into Different Formats! Bluffy - Convert Shellcode Into Different Formats! Reviewed by Zion3R on 8:30 AM Rating: 5
Kerbrute - An Script To Perform Kerberos Bruteforcing By Using Impacket Kerbrute - An Script To Perform Kerberos Bruteforcing By Using Impacket Reviewed by Zion3R on 5:30 PM Rating: 5
CRT - CrowdStrike Reporting Tool for Azure CRT - CrowdStrike Reporting Tool for Azure Reviewed by Zion3R on 8:30 AM Rating: 5
Mininode - A CLI Tool To Reduce The Attack Surface Of The Node.js Applications By Using Static Analysis Mininode - A CLI Tool To Reduce The Attack Surface Of The Node.js Applications By Using Static Analysis Reviewed by Zion3R on 5:30 PM Rating: 5
Combobulator - Framework To Detect And Prevent Dependency Confusion Leakage And Potential Attacks Combobulator - Framework To Detect And Prevent Dependency Confusion Leakage And Potential Attacks Reviewed by Zion3R on 8:30 AM Rating: 5
Gh-Dork - Github Dorking Tool Gh-Dork - Github Dorking Tool Reviewed by Zion3R on 5:30 PM Rating: 5
BloodyAD - An Active Directory Privilege Escalation Framework BloodyAD - An Active Directory Privilege Escalation Framework Reviewed by Zion3R on 8:30 AM Rating: 5
Ninjasworkout - Vulnerable NodeJS Web Application Ninjasworkout - Vulnerable NodeJS Web Application Reviewed by Zion3R on 5:30 PM Rating: 5
Xolo - Tool To Crawl, Visualize And Interact With SQL Server Links In A D3 Graph Xolo -  Tool To Crawl, Visualize And Interact With SQL Server Links In A D3 Graph Reviewed by Zion3R on 8:30 AM Rating: 5
Dontgo403 - Tool To Bypass 40X Response Codes Dontgo403 - Tool To Bypass 40X Response Codes Reviewed by Zion3R on 10:52 PM Rating: 5
FACT - A Tool To Collect, Process And Visualise Forensic Data From Clusters Of Machines Running In The Cloud Or On-Premise FACT - A Tool To Collect, Process And Visualise Forensic Data From Clusters Of Machines Running In The Cloud Or On-Premise Reviewed by Zion3R on 8:30 AM Rating: 5
Http2Smugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion Http2Smugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion Reviewed by Zion3R on 5:30 PM Rating: 5
VulnLab - A Web Vulnerability Lab Project VulnLab - A Web Vulnerability Lab Project Reviewed by Zion3R on 8:30 AM Rating: 5
Whatfiles - Log What Files Are Accessed By Any Linux Process Whatfiles - Log What Files Are Accessed By Any Linux Process Reviewed by Zion3R on 5:30 PM Rating: 5
Second-Order - Subdomain Takeover Scanner Second-Order - Subdomain Takeover Scanner Reviewed by Zion3R on 8:30 AM Rating: 5
Mandiant-Azure-AD-Investigator - PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity Mandiant-Azure-AD-Investigator - PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity Reviewed by Zion3R on 5:30 PM Rating: 5
Pwndora - Massive IPv4 Scanner, Find And Analyze Internet-Connected Devices In Minutes, Create Your Own IoT Search Engine At Home Pwndora - Massive IPv4 Scanner, Find And Analyze Internet-Connected Devices In Minutes, Create Your Own IoT Search Engine At Home Reviewed by Zion3R on 8:30 AM Rating: 5
T-Reqs-HTTP-Fuzzer - A Grammar-Based HTTP Fuzzer T-Reqs-HTTP-Fuzzer - A Grammar-Based HTTP Fuzzer Reviewed by Zion3R on 5:30 PM Rating: 5
Wireshark-Forensics-Plugin - A cross-platform Wireshark plugin that correlates network traffic data with threat intelligence, asset categorization & vulnerability data Wireshark-Forensics-Plugin -  A cross-platform Wireshark plugin that correlates network traffic data with threat intelligence, asset categorization & vulnerability data Reviewed by Zion3R on 8:30 AM Rating: 5
Dep-Scan - Fully Open-Source Security Audit For Project Dependencies Based On Known Vulnerabilities And Advisories. Supports Both Local Repos And Container Images. Integrates With Various CI Environments Such As Azure Pipelines, CircleCI, Google CloudBuild Dep-Scan - Fully Open-Source Security Audit For Project Dependencies Based On Known Vulnerabilities And Advisories. Supports Both Local Repos And Container Images. Integrates With Various CI Environments Such As Azure Pipelines, CircleCI, Google CloudBuild Reviewed by Zion3R on 8:30 AM Rating: 5
Http-Desync-Guardian - Analyze HTTP Requests To Minimize Risks Of HTTP Desync Attacks (Precursor For HTTP Request Smuggling/Splitting) Http-Desync-Guardian - Analyze HTTP Requests To Minimize Risks Of HTTP Desync Attacks (Precursor For HTTP Request Smuggling/Splitting) Reviewed by Zion3R on 5:30 PM Rating: 5
Pip-Audit - Audits Python Environments And Dependency Trees For Known Vulnerabilities Pip-Audit - Audits Python Environments And Dependency Trees For Known Vulnerabilities Reviewed by Zion3R on 8:30 AM Rating: 5
goCabrito - Super Organized And Flexible Script For Sending Phishing Campaigns goCabrito - Super Organized And Flexible Script For Sending Phishing Campaigns Reviewed by Zion3R on 5:30 PM Rating: 5
Driftwood - Private Key Usage Verification Driftwood - Private Key Usage Verification Reviewed by Zion3R on 8:30 AM Rating: 5
reFlutter - Flutter Reverse Engineering Framework reFlutter - Flutter Reverse Engineering Framework Reviewed by Zion3R on 5:30 PM Rating: 5
Inject-Assembly - Inject .NET Assemblies Into An Existing Process Inject-Assembly - Inject .NET Assemblies Into An Existing Process Reviewed by Zion3R on 8:30 AM Rating: 5
Registry-Spy - Cross-platform Registry Browser For Raw Windows Registry Files Registry-Spy - Cross-platform Registry Browser For Raw Windows Registry Files Reviewed by Zion3R on 5:30 PM Rating: 5
TokenUniverse - An Advanced Tool For Working With Access Tokens And Windows Security Policy TokenUniverse - An Advanced Tool For Working With Access Tokens And Windows Security Policy Reviewed by Zion3R on 8:30 AM Rating: 5
Iptable_Evil - An Evil Bit Backdoor For Iptables Iptable_Evil - An Evil Bit Backdoor For Iptables Reviewed by Zion3R on 5:30 PM Rating: 5
Narthex - Modular Personalized Dictionary Generator Narthex - Modular Personalized Dictionary Generator Reviewed by Zion3R on 8:30 AM Rating: 5
Espoofer - An Email Spoofing Testing Tool That Aims To Bypass SPF/DKIM/DMARC And Forge DKIM Signatures Espoofer - An Email Spoofing Testing Tool That Aims To Bypass SPF/DKIM/DMARC And Forge DKIM Signatures Reviewed by Zion3R on 5:30 PM Rating: 5
Raven - Advanced Cyber Threat Map (Simplified, Customizable, Responsive) Raven - Advanced Cyber Threat Map (Simplified, Customizable, Responsive) Reviewed by Zion3R on 8:30 AM Rating: 5
AlphaGolang - IDApython Scripts For Analyzing Golang Binaries AlphaGolang - IDApython Scripts For Analyzing Golang Binaries Reviewed by Zion3R on 5:30 PM Rating: 5
Scemu - X86 32bits Emulator, For Securely Emulating Shellcodes Scemu - X86 32bits Emulator, For Securely Emulating Shellcodes Reviewed by Zion3R on 8:30 AM Rating: 5
Wifi-Framework - Wi-Fi Framework For Creating Proof-Of-Concepts, Automated Experiments, Test Suites, Fuzzers, And More... Wifi-Framework - Wi-Fi Framework For Creating Proof-Of-Concepts, Automated Experiments, Test Suites, Fuzzers, And More... Reviewed by Zion3R on 5:30 PM Rating: 5
RAUDI - A Repo To Automatically Generate And Keep Updated A Series Of Docker Images Through GitHub Actions RAUDI - A Repo To Automatically Generate And Keep Updated A Series Of Docker Images Through GitHub Actions Reviewed by Zion3R on 8:30 AM Rating: 5
SpoofThatMail - Bash Script To Check If A Domain Or List Of Domains Can Be Spoofed Based In DMARC Records SpoofThatMail - Bash Script To Check If A Domain Or List Of Domains Can Be Spoofed Based In DMARC Records Reviewed by Zion3R on 5:30 PM Rating: 5
WannaRace - WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition WannaRace - WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition Reviewed by Zion3R on 8:30 AM Rating: 5
PasteMonitor - Scrape Pastebin API To Collect Daily Pastes, Setup A Wordlist And Be Alerted By Email When You Have A Match PasteMonitor - Scrape Pastebin API To Collect Daily Pastes, Setup A Wordlist And Be Alerted By Email When You Have A Match Reviewed by Zion3R on 5:30 PM Rating: 5
LACheck - Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration LACheck - Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration Reviewed by Zion3R on 8:30 AM Rating: 5
Shellcode-Encryptor - A Simple Shell Code Encryptor/Decryptor/Executor To Bypass Anti Virus Shellcode-Encryptor - A Simple Shell Code Encryptor/Decryptor/Executor To Bypass Anti Virus Reviewed by Zion3R on 5:30 PM Rating: 5
RCLocals - Linux Startup Analyzer RCLocals - Linux Startup Analyzer Reviewed by Zion3R on 8:30 AM Rating: 5
Mortar - Evasion Technique To Defeat And Divert Detection And Prevention Of Security Products (AV/EDR/XDR) Mortar - Evasion Technique To Defeat And Divert Detection And Prevention Of Security Products (AV/EDR/XDR) Reviewed by Zion3R on 9:30 AM Rating: 5
Log4J-Detect - Script To Detect The "Log4j" Java Library Vulnerability (CVE-2021-44228) For A List Of URLs With Multithreading Log4J-Detect - Script To Detect The "Log4j" Java Library Vulnerability (CVE-2021-44228) For A List Of URLs With Multithreading Reviewed by Zion3R on 8:30 AM Rating: 5
Rustpad - Multi-Threaded Padding Oracle Attacks Against Any Service Rustpad - Multi-Threaded Padding Oracle Attacks Against Any Service Reviewed by Zion3R on 5:30 PM Rating: 5
SyntheticSun - A Defense-In-Depth Security Automation And Monitoring Framework Which Utilizes Threat Intelligence, Machine Learning, Managed AWS Security Services And, Serverless Technologies To Continuously Prevent, Detect And Respond To Threats SyntheticSun - A Defense-In-Depth Security Automation And Monitoring Framework Which Utilizes Threat Intelligence, Machine Learning, Managed AWS Security Services And, Serverless Technologies To Continuously Prevent, Detect And Respond To Threats Reviewed by Zion3R on 8:30 AM Rating: 5
RPC Firewall - Stopping Lateral Movement via the RPC Firewall RPC Firewall - Stopping Lateral Movement via the RPC Firewall Reviewed by Zion3R on 5:30 PM Rating: 5
Msmailprobe - Office 365 And Exchange Enumeration Msmailprobe - Office 365 And Exchange Enumeration Reviewed by Zion3R on 8:30 AM Rating: 5
Pages 17123456 Next >