Small utility program to perform multiple operations for a given subnet/CIDR ranges.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Bypass IP source restrictions using HTTP headers.
Free Mac OS X computer forensics tool.
Deep reinforcement learning instrumenting bettercap for WiFi pwning.
Browser extension that extracts users from LinkedIn company pages.
Continuation of the unmaintained proxychains project.
Generates lists of live hosts and URLs.
Learn how OWASP Top 10 security risks apply to web applications developed using Node.js.
A Chrome Extension to track postMessage usage (url, domain and stack).
Prototype pollution scanner using headless chrome.
A simple program to query nmap XML files in the terminal.
Amazon S3 bucket finder and crawler.
A little tool to play with Windows security.
Run PowerShell with rundll32 in order to bypass software restrictions.