Wednesday, 8 August 2018

Step: A tool to Make Work easier for zero trust technologies

Step is a zero trust swiss army knife. It’s an easy-to-use and hard-to-misuse utility for building, operating, and automating systems tha... thumbnail 1 summary
  • Step is a zero trust swiss army knife. It’s an easy-to-use and hard-to-misuse utility for building, operating, and automating systems tha...

    p0wnedShell : Post Exploitation Toolkit

    p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and... thumbnail 1 summary
  • p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and...

    Monday, 6 August 2018

    Bashark - Post exploitation toolkit

    Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Usage To ... thumbnail 1 summary
  • Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Usage To ...

    Repo Security Scanner - Search secrets from GitHub

    repo-security-scanner CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys Run it against your ... thumbnail 1 summary
  • repo-security-scanner CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys Run it against your ...

    Sunday, 29 July 2018

    Stegextract: Extract Hidden files and strings from Images.

    Description Stegextract extracts any trailing data after the image's closing bytes, and any hidden files (or other images) embedded... thumbnail 1 summary
  • Description Stegextract extracts any trailing data after the image's closing bytes, and any hidden files (or other images) embedded...

    Raccoon: Tool for Reconnaissance and Information Gathering

    Features DNS details DNS visual mapping using DNS dumpster WHOIS information TLS Data - supported ciphers, TLS versions, certif... thumbnail 1 summary
  • Features DNS details DNS visual mapping using DNS dumpster WHOIS information TLS Data - supported ciphers, TLS versions, certif...

    Tuesday, 24 July 2018

    Photon: Fast web crawler for Recon

    Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target. Usage -u --url Run Photon ag... thumbnail 1 summary
  • Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target. Usage -u --url Run Photon ag...