 |
CDK |
| Make security testing of K8s, Docker, and Containerd easier. |
|
|
 |
jsfinder |
| Fetches JavaScript files quickly and comprehensively from a defined list of URLs or domains. |
|
|
 |
EAPHammer |
| Targeted attacks against WPA2-Enterprise networks, wireless pivots using hostile portal attacks. |
|
|
 |
katoolin3 |
| Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint. |
|
|
 |
Phishery |
| An SSL enabled basic auth credential harvester with a Word document template URL injector. |
|
|
 |
CDN Proxy |
| Create a copy of a targeted website with CDN and WAF restrictions disabled. |
|
|
 |
WinPwnage |
| UAC bypass, Elevate, Persistence methods. |
|
|
 |
catphish |
| Generate similar-looking domains for phishing attacks. |
|
|
 |
GCPBucketBrute |
| Enumerate Google Storage buckets, check the access and if they can be privilege escalated. |
|
|
 |
RedHunt-OS |
| Virtual machine for adversary emulation and threat hunting. |
|
|
 |
securityonion |
| Free and open platform for threat hunting, enterprise security monitoring, and log management. |
|
|
 |
litefuzz |
| A multi-platform fuzzer for poking at userland binaries and servers. |
|
|
 |
Vegile |
| Post exploitation tool to maintain some level of acces. |
|
|
 |
Microsploit |
| Quickly and easily create backdoor Office exploitation using module Metasploit packet. |
|
|
 |
FiercePhish |
| Full-fledged phishing framework to manage all phishing engagements. |
|
|
 |
radare2 |
| UNIX-like reverse engineering framework and command-line toolset. |
|
|
|
|
 |
SMBetray |
| Attack clients through file content swapping and compromise any data passed in cleartext. |
|
|