LinkedInDumper Python 3 script to dump company employees from LinkedIn Voyager API. The results contain firstname, lastname, position (title), location, and a user’s profile link. Only 2 API calls are...
Discord Voice Channel C2 aka DCVC2 This multi-operating system-compatible tool was created to leverage Discord’s voice channels for command and control operations. This tool operates entirely over the Real-Time Protocol...
KeePwn A python script to help red teamers discover KeePass instances and extract secrets. Features & Roadmap KeePass Discovery Accept multiple target sources (IP, range, hostname, file) Automatically look for...
AtomLdr: A DLL loader with evasive features Features: CRT library independent. The final DLL file, can run the payload by loading the DLL (executing its entry point), or by executing...
Kubestroyer Kubestroyer aims to exploit Kubernetes clusters misconfigurations and be the swiss army knife of your Kubernetes pentests. Kubestroyer is a Golang exploitation tool that aims to take advantage of Kubernetes...
MAAD Attack Framework MAAD-AF is an open-source cloud attack tool developed for testing the security of Microsoft 365 & Azure AD environments through adversary emulation. MAAD-AF provides security practitioners with...
Handle-Ripper Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system without permission. It is a type of privilege escalation...
Bypass Sandbox Evasion Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether a suspicious file exhibits any malicious behavior....
Fiber A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the priority-based scheduling mechanism built into Windows. Fibers are often...
KILLER TOOL (EDR Evasion) It’s an AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Features: Module Stomping for Memory scanning evasion DLL...
burpgpt burpgpt leverages the power of AI to detect security vulnerabilities that traditional scanners might miss. It sends web traffic to an OpenAI model specified by the user, enabling sophisticated analysis within...
Backup Operator Toolkit The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin. Use The BackupOperatorToolkit (BOT) has 4 different mode that allows you to...
Scanner and Patcher This tool is very helpful for finding vulnerabilities present in Web Applications. A web application scanner explores a web application by crawling through its web pages and...
debugHunter – Chrome Extension Discover hidden debugging parameters and uncover web application secrets with debugHunter. This Chrome extension scans websites for debugging parameters and notifies you when it finds a...
Graphicator Graphicator is a GraphQL “scraper” / extractor. The tool iterates over the introspection document returned by the targeted GraphQL endpoint, and then re-structures the schema in an internal form...