Search Suggest

August 2018

Step: A tool to Make Work easier for zero trust technologies

Step is a zero trust swiss army knife. It’s an easy-to-use and hard-to-misuse utility for building, operating, and automating systems that use zer…

p0wnedShell : Post Exploitation Toolkit

p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and function…

Bashark - Post exploitation toolkit

Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Usage To launch Ba…

Repo Security Scanner - Search secrets from GitHub

repo-security-scanner CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys Run it against your entire re…