Stars
A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation ta…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.
My Notes about Penetration Testing
FindGPPPasswords, A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts.
psexecsvc - a python implementation of PSExec's native service implementation
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
A safe place for your valuable information
A utility for detecting webpage inputs and conducting XSS scans.
Simple Telegram Bot to Download and Upload Files From Mega.nz
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and incr…
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offers two modes of operation: automated and manual.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
Open-source event management and ticket selling platform. Perfect for concerts, conferences, and everything in between 🎟️
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
Converts MySQL dump to SQLite3 compatible dump