Lists (2)
Sort Name ascending (A-Z)
Stars
real time face swap and one-click video deepfake with only a single image
Playground (and dump) of stuff I make or modify for the Flipper Zero
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
🐬 Feature-rich, stable and customizable Flipper Firmware
A fast, simple, recursive content discovery tool written in Rust.
A command line toolkit to generate maps, point clouds, 3D models and DEMs from drone, balloon or kite images. 📷
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Simple DNS proxy with DoH, DoT, DoQ and DNSCrypt support
RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
An ultra-lightweight and blazing-fast Messaging Broker/Bus for IoT Edge & SDV
Nidhogg is an all-in-one simple to use windows kernel rootkit.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.
Template-Driven AV/EDR Evasion Framework
Azure Security Resources and Notes
A tool for checking if MFA is enabled on multiple Microsoft Services
OSINT Tool: Generate username lists for companies on LinkedIn
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
CaribouLite turns any 40-pin Raspberry-Pi into a Tx/Rx 6GHz SDR
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Enumerate the permissions associated with AWS credential set
Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler.
Send phishing messages and attachments to Microsoft Teams users