Kraken - A Multi-Platform Distributed Brute-Force Password Cracking System Kraken - A Multi-Platform Distributed Brute-Force Password Cracking System Reviewed by Zion3R on 5:30 PM Rating: 5
EDRSandblast - Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections EDRSandblast - Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections Reviewed by Zion3R on 8:30 AM Rating: 5
Shhhloader - SysWhispers Shellcode Loader Shhhloader - SysWhispers Shellcode Loader Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
NimPackt-v1 - Nim-based Assembly Packer And Shellcode Loader For Opsec And Profit NimPackt-v1 - Nim-based Assembly Packer And Shellcode Loader For Opsec And Profit Reviewed by Zion3R on 8:30 AM Rating: 5
EvilSelenium - A Tool That Weaponizes Selenium To Attack Chromium Based Browsers EvilSelenium - A Tool That Weaponizes Selenium To Attack Chromium Based Browsers Reviewed by Zion3R on 5:30 PM Rating: 5
Wholeaked - A File-Sharing Tool That Allows You To Find The Responsible Person In Case Of A Leakage Wholeaked - A File-Sharing Tool That Allows You To Find The Responsible Person In Case Of A Leakage Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
DarthSidious - Building An Active Directory Domain And Hacking It DarthSidious - Building An Active Directory Domain And Hacking It Reviewed by Zion3R on 8:30 AM Rating: 5
ICMP-TransferTools - Transfer Files To And From A Windows Host Via ICMP In Restricted Network Environments ICMP-TransferTools - Transfer Files To And From A Windows Host Via ICMP In Restricted Network Environments Reviewed by Zion3R on 5:30 PM Rating: 5
Live-Forensicator - Powershell Script To Aid Incidence Response And Live Forensics Live-Forensicator - Powershell Script To Aid Incidence Response And Live Forensics Reviewed by Zion3R on 8:30 AM Rating: 5
Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation Reviewed by Zion3R on 5:30 PM Rating: 5
SysWhispers3 - AV/EDR Evasion Via Direct System Calls SysWhispers3 - AV/EDR Evasion Via Direct System Calls Reviewed by Zion3R on 5:30 PM Rating: 5
Factual-Rules-Generator - An Open Source Project Which Aims To Generate YARA Rules About Installed Software From A Machine Factual-Rules-Generator - An Open Source Project Which Aims To Generate YARA Rules About Installed Software From A Machine Reviewed by Zion3R on 8:30 AM Rating: 5
ShellcodeTemplate - An Easily Modifiable Shellcode Template For Windows X64/X86 ShellcodeTemplate - An Easily Modifiable Shellcode Template For Windows X64/X86 Reviewed by Zion3R on 8:30 AM Rating: 5
FastFinder - Incident Response - Fast Suspicious File Finder FastFinder - Incident Response - Fast Suspicious File Finder Reviewed by Zion3R on 8:32 PM Rating: 5
WMEye - A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement WMEye - A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement Reviewed by Zion3R on 8:30 AM Rating: 5
Lnkbomb - Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares Lnkbomb - Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares Reviewed by Zion3R on 5:30 PM Rating: 5
WSVuls - Website Vulnerability Scanner Detect Issues (Outdated Server Software And Insecure HTTP Headers) WSVuls - Website Vulnerability Scanner Detect Issues (Outdated Server Software And Insecure HTTP Headers) Reviewed by Zion3R on 8:30 AM Rating: 5
Geowifi - Search WiFi Geolocation Data By BSSID And SSID On Different Public Databases Geowifi - Search WiFi Geolocation Data By BSSID And SSID On Different Public Databases Reviewed by Zion3R on 8:30 AM Rating: 5
Litefuzz - A Multi-Platform Fuzzer For Poking At Userland Binaries And Servers Litefuzz - A Multi-Platform Fuzzer For Poking At Userland Binaries And Servers Reviewed by Zion3R on 8:30 AM Rating: 5
CAPEv2 - Malware Configuration And Payload Extraction CAPEv2 - Malware Configuration And Payload Extraction Reviewed by Zion3R on 8:30 AM Rating: 5