Category: Penetration Testing

social engineering engagements

evilgophish: Combination of evilginx2 and GoPhish

evilgophish Combination of evilginx2 and GoPhish. Why? As a penetration tester or red teamer, you may have heard of evilginx2 as a proxy man-in-the-middle framework capable of bypassing two-factor/multi-factor authentication. This is enticing to...

WebShell Generator

msmap v0.7 releases: Memory WebShell Generator

MSMAP Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer, and Management Clients. Function  Dynamic Menu  Automatic Compilation  Generate Script  Lite Mode  Graphical Interface...

Kubernetes audit tool

kubeeye v1.0 releases: audit tool for Kubernetes

kubeeye KubeEye is an audit tool for Kubernetes to discover Kubernetes resources (by OPA ), cluster components, cluster nodes (by Node-Problem-Detector), and other configurations that are meeting with best practices and giving suggestions...

Vulnerable client-server application

vucsa v1.1 releases: Vulnerable Client-Server Application

Vulnerable Client-Server Application (VuCSA) A vulnerable client-server application (VuCSA) is made for learning/presenting how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX graphical...

execute arbitrary javascript

jscythe: execute arbitrary javascript code

jscythe jscythe abuses the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code, even if their debugging capabilities are disabled. Tested and working against Visual...