TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a…
TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a…
Postenum is a clean, nice and easy tool for basic/advanced privilege escalation techniques.
TROMMEL sifts through embedded device files to identify potential vulnerable indicators. The tool can be used to search files and…
PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use…
mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing…
Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and…
PacketWhisper – Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name…
Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…
Powershell script to setup windows port forwarding using native netsh client