 |
CDK |
Make security testing of K8s, Docker, and Containerd easier. |
|
|
 |
jsfinder |
Fetches JavaScript files quickly and comprehensively from a defined list of URLs or domains. |
|
|
 |
EAPHammer |
Targeted attacks against WPA2-Enterprise networks, wireless pivots using hostile portal attacks. |
|
|
 |
katoolin3 |
Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint. |
|
|
 |
Phishery |
An SSL enabled basic auth credential harvester with a Word document template URL injector. |
|
|
 |
CDN Proxy |
Create a copy of a targeted website with CDN and WAF restrictions disabled. |
|
|
 |
WinPwnage |
UAC bypass, Elevate, Persistence methods. |
|
|
 |
catphish |
Generate similar-looking domains for phishing attacks. |
|
|
 |
GCPBucketBrute |
Enumerate Google Storage buckets, check the access and if they can be privilege escalated. |
|
|
 |
RedHunt-OS |
Virtual machine for adversary emulation and threat hunting. |
|
|
 |
securityonion |
Free and open platform for threat hunting, enterprise security monitoring, and log management. |
|
|
 |
litefuzz |
A multi-platform fuzzer for poking at userland binaries and servers. |
|
|
 |
Vegile |
Post exploitation tool to maintain some level of acces. |
|
|
 |
Microsploit |
Quickly and easily create backdoor Office exploitation using module Metasploit packet. |
|
|
 |
FiercePhish |
Full-fledged phishing framework to manage all phishing engagements. |
|
|
 |
radare2 |
UNIX-like reverse engineering framework and command-line toolset. |
|
|
|
|
 |
SMBetray |
Attack clients through file content swapping and compromise any data passed in cleartext. |
|
|