BaRMIe - Java RMI Enumeration And Attack Tool BaRMIe - Java RMI Enumeration And Attack Tool Reviewed by Lydecker Black on 6:02 PM Rating: 5
CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation Reviewed by Lydecker Black on 6:00 PM Rating: 5
changeme - A Default Credential Scanner changeme - A Default Credential Scanner Reviewed by Lydecker Black on 10:30 AM Rating: 5
PowerSAP - Powershell SAP Assessment Tool PowerSAP - Powershell SAP Assessment Tool Reviewed by Lydecker Black on 6:00 PM Rating: 5
ACLight - PowerShell Script for Advanced Discovery of Privileged Accounts (includes Shadow Admins) ACLight - PowerShell Script for Advanced Discovery of Privileged Accounts (includes Shadow Admins) Reviewed by Lydecker Black on 10:30 AM Rating: 5
DET - (extensible) Data Exfiltration Toolkit DET - (extensible) Data Exfiltration Toolkit Reviewed by Lydecker Black on 10:30 AM Rating: 5
TorWall - Transparent Tor for Windows TorWall - Transparent Tor for Windows Reviewed by Lydecker Black on 10:30 AM Rating: 5
FruityC2 - Post-Exploitation Tool to Manage Compromised Machines from a Web Interface FruityC2 - Post-Exploitation Tool to Manage Compromised Machines  from a Web Interface Reviewed by Lydecker Black on 9:54 PM Rating: 5
TeleShadow - Telegram Desktop Session Stealer (Windows) TeleShadow - Telegram Desktop Session Stealer (Windows) Reviewed by Lydecker Black on 5:45 PM Rating: 5
SMBMap - Samba Share Enumeration Tool SMBMap - Samba Share Enumeration Tool Reviewed by Lydecker Black on 10:30 AM Rating: 5
BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool) BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool) Reviewed by Lydecker Black on 11:35 AM Rating: 5
ThunderShell - PowerShell based RAT ThunderShell - PowerShell based RAT Reviewed by Lydecker Black on 11:25 AM Rating: 5
BloodHound - Six Degrees of Domain Admin BloodHound - Six Degrees of Domain Admin Reviewed by Lydecker Black on 11:18 AM Rating: 5
CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks Reviewed by Lydecker Black on 10:10 AM Rating: 5
PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) Reviewed by Lydecker Black on 6:12 PM Rating: 5
Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Reviewed by Lydecker Black on 6:33 PM Rating: 5
clusterd - Application Server Attack Toolkit clusterd - Application Server Attack Toolkit Reviewed by Lydecker Black on 6:04 PM Rating: 5
LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells Reviewed by Lydecker Black on 6:54 PM Rating: 5
dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol Reviewed by Lydecker Black on 11:30 AM Rating: 5
LaZagne v2.2 - Credentials Recovery Project LaZagne v2.2 - Credentials Recovery Project Reviewed by Lydecker Black on 11:30 AM Rating: 5