Highlights
- Pro
Stars
SupplyShark is a Python-based reconnaissance tool designed to detect package hijacking, dependency confusion, and typosquatting opportunities across multiple package registries.
Automatic multi-tenancy for Laravel. No code changes needed.
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
Event Tracing for Windows EDR bypass in Rust (usermode)
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find which is working fr)
Generate unicode domains for IDN Homograph Attack and detect them.
A Bash script that automates the creation of a Cobalt Strike Malleable Profile.
🔥🔥🔥 Open-source Jira, Linear, Monday, and ClickUp alternative. Plane is a modern project management platform to manage tasks, sprints, docs, and triage.
Alternative Shellcode Execution Via Callbacks
Rust Weaponization for Red Team Engagements.
A workshop about Malware Development
A Lightweight Face Recognition and Facial Attribute Analysis (Age, Gender, Emotion and Race) Library for Python
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Burp Plugin to Bypass WAFs through the insertion of Junk Data
A Remote Access Tool using Google Apps Script as the proxy for command and control.
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It ca…
Red Team Tips as posted by @vysecurity on Twitter
clone from https://sourceforge.net/projects/crunch-wordlist/
Remote operations commands implemented using Beacon Object Files
Collection of malware source code for a variety of platforms in an array of different programming languages.