Unusual overheating of a smartphone, spontaneous installation of unfamiliar apps, or a sudden spike in data usage might signal that the device has been infected with malicious software. Smartphones have become indispensable for many...
promptmap Prompt injection is a type of security vulnerability that can be exploited to control the behavior of a ChatGPT instance. By injecting malicious prompts into the system, an attacker can force the ChatGPT...
TREVORproxy TREVORproxy is a simple SOCKS proxy that helps avoid Smart Lockout by load-balancing your requests between multiple IP addresses. It accomplishes this with built-in Linux features — no complex OpenVPN setups or strange firewall...
RecoverPy You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your request....
onionservice Feature-rich Onion Service manager for UNIX-like operating systems written in POSIX conformant shellscript A collection of Onion Services features implemented for Unix-like systems following the Portable Operating System Interface standard. WARNING: do not...
Total Registry Replacement for the Windows built-in Regedit.exe tool. Improvements over that tool include: Show real Registry (not just the standard one) Sort list view by any column Key icons for hives, inaccessible keys, and links...
mubeng An incredibly fast proxy checker & IP rotator with ease. Feature Proxy IP rotator: Rotates your IP address for every specific request. Proxy checker: Check your proxy IP which is still alive. All...
PoshBot PoshBot is a chatbot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules are loaded into PoshBot and instantly become available as bot commands. PoshBot currently supports...
Every system has an Application data (App data) folder which consists of data created by the programs. Many applications (preinstalled or user-installed) create their own folder where data is continually stored. The data here...
Xolo A tool to crawl, visualize, and interact with SQL server links in a d3 graph to help in your red/blue/purple/…/assessments team exercises. Notes: -When the graph displayed left double click in a node...
Scanning reports to tabular (sr2t) This tool takes a scanning tool’s output file and converts it to a tabular format (CSV, XLSX, or text table). This tool can process output from the following tools:...
Kage Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads. For now, it only supports windows/meterpreter & android/meterpreter. Install Requirement Metasploit-framework must be installed and in...
FireProx Being able to hide or continually rotate the source IP address when making web calls can be difficult or expensive. A number of tools have existed for some time but they were either...
i2pd i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client. I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don’t reveal...
NetSet Operational Security utility and Automator. NetSet is designed to automate a number of operations that will help the user with securing their network traffic. It also provides an easy way to gather proxies...