Lupo - Malware IOC Extractor. Debugging Module For Malware Analysis Automation
Reviewed by Zion3R
on
8:30 AM
Rating:
BITB - Browser In The Browser (BITB) Templates
Reviewed by Zion3R
on
5:30 PM
Rating: 5
O365-Doppelganger - A Quick Handy Script To Harvest Credentials Off Of A User During A Red Team And Get Execution Of A File From The User
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
DumpSMBShare - A Script To Dump Files And Folders Remotely From A Windows SMB Share
Reviewed by Zion3R
on
8:30 AM
Rating: 5
ADReaper - A Fast Enumeration Tool For Windows Active Directory Pentesting Written In Go
Reviewed by Zion3R
on
8:30 AM
Rating: 5
KrbRelay - Framework For Kerberos Relaying
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
Zircolite - A Standalone SIGMA-based Detection Tool For EVTX, Auditd And Sysmon For Linux Logs
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Kraken - A Multi-Platform Distributed Brute-Force Password Cracking System
Reviewed by Zion3R
on
5:30 PM
Rating: 5
EDRSandblast - Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Shhhloader - SysWhispers Shellcode Loader
Reviewed by Zion3R
on
5:30 PM
Rating: 5
NimPackt-v1 - Nim-based Assembly Packer And Shellcode Loader For Opsec And Profit
Reviewed by Zion3R
on
8:30 AM
Rating: 5
EvilSelenium - A Tool That Weaponizes Selenium To Attack Chromium Based Browsers
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Wholeaked - A File-Sharing Tool That Allows You To Find The Responsible Person In Case Of A Leakage
Reviewed by Zion3R
on
8:30 AM
Rating: 5
DarthSidious - Building An Active Directory Domain And Hacking It
Reviewed by Zion3R
on
8:30 AM
Rating: 5
ICMP-TransferTools - Transfer Files To And From A Windows Host Via ICMP In Restricted Network Environments
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Live-Forensicator - Powershell Script To Aid Incidence Response And Live Forensics
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation
Reviewed by Zion3R
on
5:30 PM
Rating: 5
SysWhispers3 - AV/EDR Evasion Via Direct System Calls
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Factual-Rules-Generator - An Open Source Project Which Aims To Generate YARA Rules About Installed Software From A Machine
Reviewed by Zion3R
on
8:30 AM
Rating: 5
ShellcodeTemplate - An Easily Modifiable Shellcode Template For Windows X64/X86
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Subscribe to:
Posts (Atom)