Sr2T - Converts Scanning Reports To A Tabular Format Sr2T - Converts Scanning Reports To A Tabular Format Reviewed by Zion3R on 8:30 AM Rating: 5
DNS-Tunnel-Keylogger - Keylogging Server And Client That Uses DNS Tunneling/Exfiltration To Transmit Keystrokes DNS-Tunnel-Keylogger - Keylogging Server And Client That Uses DNS Tunneling/Exfiltration To Transmit Keystrokes Reviewed by Zion3R on 8:30 AM Rating: 5
MultiDump - Post-Exploitation Tool For Dumping And Extracting LSASS Memory Discreetly MultiDump - Post-Exploitation Tool For Dumping And Extracting LSASS Memory Discreetly Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Shodan Dorks Shodan Dorks Reviewed by Zion3R on 8:30 AM Rating: 5
Gtfocli - GTFO Command Line Interface For Easy Binaries Search Commands That Can Be Used To Bypass Local Security Restrictions In Misconfigured Systems Gtfocli - GTFO Command Line Interface For Easy Binaries Search Commands That Can Be Used To Bypass Local Security Restrictions In Misconfigured Systems Reviewed by Zion3R on 8:38 PM Rating: 5
WinFiHack - A Windows Wifi Brute Forcing Utility Which Is An Extremely Old Method But Still Works Without The Requirement Of External Dependencies WinFiHack - A Windows Wifi Brute Forcing Utility Which Is An Extremely Old Method But Still Works Without The Requirement Of External Dependencies Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
RKS - A Script To Automate Keystrokes Through A Graphical Desktop Program RKS - A Script To Automate Keystrokes Through A Graphical Desktop Program Reviewed by Zion3R on 8:30 AM Rating: 5
PurpleKeep - Providing Azure Pipelines To Create An Infrastructure And Run Atomic Tests PurpleKeep - Providing Azure Pipelines To Create An Infrastructure And Run Atomic Tests Reviewed by Zion3R on 8:30 AM Rating: 5
Pantheon - Insecure Camera Parser Pantheon - Insecure Camera Parser Reviewed by Zion3R on 8:30 AM Rating: 5
Blutter - Flutter Mobile Application Reverse Engineering Tool Blutter - Flutter Mobile Application Reverse Engineering Tool Reviewed by Zion3R on 8:30 AM Rating: 5
Linpmem - A Physical Memory Acquisition Tool For Linux Linpmem - A Physical Memory Acquisition Tool For Linux Reviewed by Zion3R on 8:30 AM Rating: 5
Nim-Shell - Reverse Shell That Can Bypass Windows Defender Detection Nim-Shell - Reverse Shell That Can Bypass Windows Defender Detection Reviewed by Zion3R on 8:30 AM Rating: 5
Douglas-042 - Powershell Script To Help Speed ​​Up Threat Hunting Incident Response Processes Douglas-042 - Powershell Script To Help Speed ​​Up Threat Hunting Incident Response Processes Reviewed by Zion3R on 8:30 AM Rating: 5
Py-Amsi - Scan Strings Or Files For Malware Using The Windows Antimalware Scan Interface Py-Amsi - Scan Strings Or Files For Malware Using The Windows Antimalware Scan Interface Reviewed by Zion3R on 8:30 AM Rating: 5
NimExec - Fileless Command Execution For Lateral Movement In Nim NimExec - Fileless Command Execution For Lateral Movement In Nim Reviewed by Zion3R on 8:30 AM Rating: 5
HiddenDesktop - HVNC For Cobalt Strike HiddenDesktop - HVNC For Cobalt Strike Reviewed by Zion3R on 8:30 AM Rating: 5
Red Canary Mac Monitor - An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research Red Canary Mac Monitor - An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research Reviewed by Zion3R on 8:30 AM Rating: 5
S4UTomato - Escalate Service Account To LocalSystem Via Kerberos S4UTomato - Escalate Service Account To LocalSystem Via Kerberos Reviewed by Zion3R on 8:30 AM Rating: 5
Dissect - Digital Forensics, Incident Response Framework And Toolset That Allows You To Quickly Access And Analyse Forensic Artefacts From Various Disk And File Formats Dissect - Digital Forensics, Incident Response Framework And Toolset That Allows You To Quickly Access And Analyse Forensic Artefacts From Various Disk And File Formats Reviewed by Zion3R on 8:30 AM Rating: 5
EDRaser - Tool For Remotely Deleting Access Logs, Windows Event Logs, Databases, And Other Files EDRaser - Tool For Remotely Deleting Access Logs, Windows Event Logs, Databases, And Other Files Reviewed by Zion3R on 8:30 AM Rating: 5