PwnLnX - An Advanced Multi-Threaded, Multi-Client Python Reverse Shell For Hacking Linux Systems PwnLnX - An Advanced Multi-Threaded, Multi-Client Python Reverse Shell For Hacking Linux Systems Reviewed by Zion3R on 5:30 PM Rating: 5
Invoke-Stealth - Simple And Powerful PowerShell Script Obfuscator Invoke-Stealth - Simple And Powerful PowerShell Script Obfuscator Reviewed by Zion3R on 8:30 AM Rating: 5
Posta - Cross-document Messaging Security Research Tool Posta - Cross-document Messaging Security Research Tool Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
BetterXencrypt - A Better Version Of Xencrypt - Xencrypt It Self Is A Powershell Runtime Crypter Designed To Evade AVs BetterXencrypt - A Better Version Of Xencrypt - Xencrypt It Self Is A Powershell Runtime Crypter Designed To Evade AVs Reviewed by Zion3R on 5:30 PM Rating: 5
Cypheroth - Automated, Extensible Toolset That Runs Cypher Queries Against Bloodhound's Neo4j Backend And Saves Output To Spreadsheets Cypheroth - Automated, Extensible Toolset That Runs Cypher Queries Against Bloodhound's Neo4j Backend And Saves Output To Spreadsheets Reviewed by Zion3R on 8:30 AM Rating: 5
HttpDoom - A Tool For Response-Based Inspection Of Websites Across A Large Amount Of Hosts For Quickly Gaining An Overview Of HTTP-based Attack Surface HttpDoom -  A Tool For Response-Based Inspection Of Websites Across A Large Amount Of Hosts For Quickly Gaining An Overview Of HTTP-based Attack Surface Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
IRTriage - Incident Response Triage - Windows Evidence Collection For Forensic Analysis IRTriage - Incident Response Triage - Windows Evidence Collection For Forensic Analysis Reviewed by Zion3R on 5:30 PM Rating: 5
Defeat-Defender - Powerful Batch Script To Dismantle Complete Windows Defender Protection And Even Bypass Tamper Protection Defeat-Defender - Powerful Batch Script To Dismantle Complete Windows Defender Protection And Even Bypass Tamper Protection Reviewed by Zion3R on 5:30 PM Rating: 5
Swissknife - Scriptable VSCode Extension To Generate Or Manipulate Data. Stop Pasting Sensitive Data In Webpag Swissknife - Scriptable VSCode Extension To Generate Or Manipulate Data. Stop Pasting Sensitive Data In Webpag Reviewed by Zion3R on 8:30 AM Rating: 5
MoveKit - Cobalt Strike Kit For Lateral Movement MoveKit - Cobalt Strike Kit For Lateral Movement Reviewed by Zion3R on 5:30 PM Rating: 5
Cpufetch - Simplistic Yet Fancy CPU Architecture Fetching Tool Cpufetch - Simplistic Yet Fancy CPU Architecture Fetching Tool Reviewed by Zion3R on 5:30 PM Rating: 5
SNOWCRASH - A Polyglot Payload Generator SNOWCRASH - A Polyglot Payload Generator Reviewed by Zion3R on 8:30 AM Rating: 5
Max - Maximizing BloodHound Max - Maximizing BloodHound Reviewed by Zion3R on 5:30 PM Rating: 5
Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets Reviewed by Zion3R on 5:30 PM Rating: 5
Watson - Enumerate Missing KBs And Suggest Exploits For Useful Privilege Escalation Vulnerabilities Watson - Enumerate Missing KBs And Suggest Exploits For Useful Privilege Escalation Vulnerabilities Reviewed by Zion3R on 5:30 PM Rating: 5
Seatbelt - A C# Project That Performs A Number Of Security Oriented Host-Survey "Safety Checks" Relevant From Both Offensive And Defensive Security Perspectives Seatbelt - A C# Project That Performs A Number Of Security Oriented Host-Survey "Safety Checks" Relevant From Both Offensive And Defensive Security Perspectives Reviewed by Zion3R on 8:30 AM Rating: 5
Rubeus - C# Toolset For Raw Kerberos Interaction And Abuses Rubeus - C# Toolset For Raw Kerberos Interaction And Abuses Reviewed by Zion3R on 5:30 PM Rating: 5
InveighZero - Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 Spoofer/Man-In-The-Middle Tool InveighZero - Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 Spoofer/Man-In-The-Middle Tool Reviewed by Zion3R on 8:30 AM Rating: 5
KICS - Find Security Vulnerabilities, Compliance Issues, And Infrastructure Misconfigurations Early In The Development Cycle Of Your Infrastructure-As-Code KICS - Find Security Vulnerabilities, Compliance Issues, And Infrastructure Misconfigurations Early In The Development Cycle Of Your Infrastructure-As-Code Reviewed by Zion3R on 5:30 PM Rating: 5
CallObfuscator - Obfuscate Specific Windows Apis With Different APIs CallObfuscator - Obfuscate Specific Windows Apis With Different APIs Reviewed by Zion3R on 8:30 AM Rating: 5