Discord Voice Channel C2 aka DCVC2 This multi-operating system-compatible tool was created to leverage Discord’s voice channels...
Penetration Testing
KeePwn A python script to help red teamers discover KeePass instances and extract secrets. Features & Roadmap...
AtomLdr: A DLL loader with evasive features Features: CRT library independent. The final DLL file, can run...
Kubestroyer Kubestroyer aims to exploit Kubernetes clusters misconfigurations and be the swiss army knife of your Kubernetes...
MAAD Attack Framework MAAD-AF is an open-source cloud attack tool developed for testing the security of Microsoft...
Handle-Ripper Handle hijacking is a technique used in Windows operating systems to gain access to resources and...
Bypass Sandbox Evasion Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure...
Fiber A fiber is a unit of execution that must be manually scheduled by the application rather...
KILLER TOOL (EDR Evasion) It’s an AV/EDR Evasion tool created to bypass security tools for learning, until...
burpgpt burpgpt leverages the power of AI to detect security vulnerabilities that traditional scanners might miss. It...
Backup Operator Toolkit The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain...
Scanner and Patcher This tool is very helpful for finding vulnerabilities present in Web Applications. A web...
debugHunter – Chrome Extension Discover hidden debugging parameters and uncover web application secrets with debugHunter. This Chrome...
Graphicator Graphicator is a GraphQL “scraper” / extractor. The tool iterates over the introspection document returned by...
jsleak It is an easy-to-use command-line tool designed to uncover secrets and links in JavaScript files or...