0
With this tool you can send fake email's with using any emails to anybody you want
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
An updated collection of resources targeting browser-exploitation.
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Automate dorking while doing bug bounty or other stuffs.
A reverse shell with Telegram control panel written in Go
Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given directory or file path. The XOR operation is executed using …
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
One line PS scripts that may come handy during your network assesment
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
Detect and bypass web application firewalls and protection systems
Small project to facilitate creation of .lnk payloads
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
Open-source tool to bypass windows and linux passwords from bootable usb
Quick and dirty dynamic redirect.rules generator
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability resea…
Bluekit is an extensible engine, CLI tool used in BlueToolkit
