PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection PowerHub is a convenient post exploitation tool which aids a pent... Read more »
- Latest Post
More Headlines
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams. With limited physical access to a target building, this tap... Read more »
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made to be used in the same folder as CloudFail . Ma... Read more »
The Ultimate WinRM Shell For Penetration Testing
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation o... Read more »
USBRIP- Simple Command Live Forensic Tool For Tracking USB device
Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux. usbrip (derived from "... Read more »
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory This package attempts to reduce the likelihood of s... Read more »