Recent posts
Network
SSH-Snake: Automated SSH-Based Network Traversal
by
Admin
on
🐍 SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, to create a co...
Automation
WebCopilot - An automation tool for XSS, SQLi, LFI, SSRF and RCE
by
Admin
on
──────▄▀▄─────▄▀▄ ─────▄█░░▀▀▀▀▀░░█▄ ...
Exploits
Exploit Released for VMware Aria Operations for Networks RCE (CVE-2023-20887) Bug
by
Admin
on
A group of researchers has unveiled a proof-of-concept (PoC) demonstration for a serious Remote Code Execution (RCE) vulnerability present i...
Windows
Windows DHCP Remote Code Execution Vulnerability (CVE-2023-28231)
by
Admin
on
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its I...
Forensic Tool
teler : Real-time HTTP Intrusion Detection
by
Admin
on
Teler is a real-time intrusion detection and threat alert based on a weblog that runs in a terminal with resources that we collect and provi...
Script
OpenAI Chat GPT Google Chrome Extension
by
Admin
on
Chrome Extension that Integrates ChatGPT (Unofficial) into Google Search. Prerequisites Unofficial ChatGPT API Chrome Extension Installation...
BugBounty
APTRS - An Automated Penetration Testing Reporting System
by
Admin
on
APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration test...
Forensic Tool
INTLog - A Flask app to Track Interesting Artifacts during an Investigation
by
Admin
on
INTLog is a simple Flask app designed to keep track of potentially interesting artifacts during an investigation. This application was desig...
Reconnaissance
EmailAll - A powerful Email Collect tool
by
Admin
on
EmailAllis a powerful Email Collect tool —— a powerful email collection tool. Installation $ git clone https://github.com/Taonn/EmailAll.gi...
Post Exploitation
DonPAPI : Dumping DPAPI Credential Remotely
by
Admin
on
Dumping relevant information on compromised targets without AV detection. DPAPI dumping Lots of credentials are protected by DPAPI . We aim ...
AWS
AWSGoat : A Damn Vulnerable AWS Infrastructure
by
Admin
on
Compromising an organization's cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfigurati...
OSITN
Custom Processing Unit - Framework to Hook, Patch and Trace CPU Microcode
by
Admin
on
Custom Processing Unit is the first dynamic analysis framework able to hook, patch, and trace CPU microcode at the software level. It works ...
GitHub
Vulnerable Spring Framework Application for Testing Spring4Shell
by
Admin
on
This application is intentionally built for testing Remote Code Execution on Spring Core aka Spring4Shell. How do I use this? First, this ...