C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. Installation chmod u+x…
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. Installation chmod u+x…
PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a…
Cyph is a cryptographically secure messaging and social networking service, providing an extreme level of privacy combined with best-in-class ease…
ShadowClone allows you to distribute your long running tasks dynamically across thousands of serverless functions and gives you the results…
Grafiki is a Django project about Sysmon and graphs, for the time being. In my opinion EventViewer, Elastic and even…
Verdict-as-a-Service (VaaS) is a service that provides a platform for scanning files for malware and other threats. It allows easy…
Time for another Kali Linux release! – Kali Linux 2022.2. This release has various impressive updates. The summary of the…
BirDuster is a Python based knockoff of the original DirBuster. BirDuster is a multi threaded Python application designed to brute…
Chlonium is an application designed for cloning Chromium Cookies. From Chromium 80 and upwards, cookies are encrypted using AES-256 GCM,…
A Developer and Security Engineer friendly package for Securing NodeJS Applications. Inspired by the log4J vulnerability (CVE-2021-44228) which can be…