Unusual overheating of a smartphone, spontaneous installation of unfamiliar apps, or a sudden spike in data usage might signal that the device has been infected with malicious software. Smartphones have...
promptmap Prompt injection is a type of security vulnerability that can be exploited to control the behavior of a ChatGPT instance. By injecting malicious prompts into the system, an attacker...
TREVORproxy TREVORproxy is a simple SOCKS proxy that helps avoid Smart Lockout by load-balancing your requests between multiple IP addresses. It accomplishes this with built-in Linux features — no complex OpenVPN...
onionservice Feature-rich Onion Service manager for UNIX-like operating systems written in POSIX conformant shellscript A collection of Onion Services features implemented for Unix-like systems following the Portable Operating System Interface...
Total Registry Replacement for the Windows built-in Regedit.exe tool. Improvements over that tool include: Show real Registry (not just the standard one) Sort list view by any column Key icons for hives,...
PoshBot PoshBot is a chatbot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules are loaded into PoshBot and instantly become available as bot...
Every system has an Application data (App data) folder which consists of data created by the programs. Many applications (preinstalled or user-installed) create their own folder where data is continually...
Xolo A tool to crawl, visualize, and interact with SQL server links in a d3 graph to help in your red/blue/purple/…/assessments team exercises. Notes: -When the graph displayed left double...
Scanning reports to tabular (sr2t) This tool takes a scanning tool’s output file and converts it to a tabular format (CSV, XLSX, or text table). This tool can process output...
Kage Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads. For now, it only supports windows/meterpreter & android/meterpreter. Install Requirement Metasploit-framework must...
FireProx Being able to hide or continually rotate the source IP address when making web calls can be difficult or expensive. A number of tools have existed for some time...
NetSet Operational Security utility and Automator. NetSet is designed to automate a number of operations that will help the user with securing their network traffic. It also provides an easy...
Webterminal bastion server Webterminal implemented by Django. This project focus on DevOps and Continuous Delivery. For now, it supports almost 90% remote management protocols such as vnc, ssh,rdp, telnet,sftp… It...
Log-killer Log Killer is a tool for [Linux/Windows] Servers. This tool will delete all your logs, just download the tool and run it on the server. If your server OS...
Tor Router Tor Router allows you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only that you need is a...