QCSuper QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G (and for certain models...
Network PenTest
V’ger V’ger is an interactive command-line application for post-exploitation of authenticated Jupyter instances with a focus on...
BadExclusions Now With Better Opsec BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented...
NTLM Relay Gat NTLM Relay Gat is a powerful tool designed to automate the exploitation of NTLM...
go-secdump Package go-secdump is a tool built to remotely extract hashes from the SAM registry hive as...
The Damne Vulnerable Android Components – DVAC Damn Vulnerable Android Components (DVAC) is an educational Android application...
proctools Small toolkit for extracting information and dumping sensitive strings from Windows processes. Made to accompany another...
ThievingFox ThievingFox is a collection of post-exploitation tools to gather credentials from various password managers and Windows...
GraphStrike GraphStrike is a suite of tools that enables Cobalt Strike’s HTTPS Beacon to use Microsoft Graph API for...
Ligolo-mp Ligolo-mp is a more specialized version of Ligolo-ng, with client-server architecture, enabling pentesters to play with multiple...
C2 Cloud The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of...
drozer drozer is a security testing framework for Android. drozer allows you to search for security vulnerabilities...
NoArgs: Manipulating and Hiding Process Arguments NoArgs is a tool designed to dynamically spoof and conceal process...
Bob the Smuggler “Bob the Smuggler” is a tool that leverages HTML Smuggling Attack and allows you...
VectorKernel PoCs for Kernelmode rootkit techniques research or education. Currently focusing on Windows OS. All modules support...