Graphical user interface for Metasploit Meterpreter and session handler.
VM that is built from the ground up with a large amount of security vulnerabilities.
The pattern matching swiss knife for malware researchers.
A nonprofit foundation that works to improve the security of software.
Open source tool for network authentication cracking.
An open source tool focused on software supply chain security.
Collects RDP, web and VNC screenshots all in one place.
A post-exploitation powershell tool for extracting juicy info from memory.
Accept URLs on stdin, replace all query string values with a user-supplied value.
Enumerates users based off RDP Screenshots.
Fetch many paths for many hosts, without killing the hosts.
The first ever CLI based menu-driven web application B-Tier recon framework.
Scrape LinkedIn without API restrictions for data reconnaissance.
Harvest employee email addresses from a specific company through LinkedIn.
Malicious shortcut generator for collecting NTLM hashes from insecure file shares.