OSINT Template Engine OSINT Template Engine is a research-grade tool for OSINT Information gathering & Attack Surface...
Penetration Testing
Callisto An Intelligent Automated Binary Vulnerability Analysis Tool Callisto is an intelligent automated binary vulnerability analysis tool....
SMShell PoC for an SMS-based shell. Send commands and receive responses over SMS from mobile broadband-capable computers....
Surf – Escalate your SSRF vulnerabilities on Modern Cloud Environments surf allows you to filter a list...
RDPCredentialStealer RDPCredentialStealer it’s malware that steals credentials provided by users in RDP using API Hooking with Detours...
nodesub Nodesub is a command-line tool for finding subdomains in bug bounty programs. It supports various subdomain...
DropSpawn DropSpawn is a CobaltStrike BOF used to spawn additional Beacons via a relatively unknown method of...
ModuleShifting ModuleShifting is a stealthier variation of Module Stomping and Module overloading injection technique. It is actually...
Caracal Caracal is a static analyzer tool over the SIERRA representation for Starknet smart contracts. Features Detectors...
S4UTomato Escalate Service Account To LocalSystem via Kerberos. Traditional Potatoes Friends familiar with the “Potato” series of...
Google this week announced the August 2023 security updates for Android devices, with patches for over 48...
A proof-of-concept (PoC) for CVE-2023-3519, a critical vulnerability in Citrix ADC that allows remote code execution, has...
PHP is a popular programming language used to create dynamic web pages. However, like any software, it...
Chimera While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a...
Chrome Cookie Stealer (and injector) Attaches to Chrome using its Remote DevTools protocol and steals/injects/clears/deletes cookies. Heavily...