There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Seth
Perform a MitM attack and extract clear text credentials from RDP connectionshallucinate
One-stop TLS traffic inspection and manipulation using dynamic instrumentationWireBug
WireBug is a toolset for Voice-over-IP penetration testingsmbcrawler
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those sharesoutis
outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).hashcathelper
Convenience tool for hashcatdns-mitm
A minimal DNS service that can provide spoofed repliesclone-cert
Simple shell script to "clone" X.509 certificatesnrf24-playset
Software tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presentersradio-hackbox
PoC tool to demonstrate vulnerabilities in wireless input devicesazurenum
Enumerate Microsoft Entra ID (Azure AD) fasticestick-lpc-tpm-sniffer
FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kitnand-dump-tools
Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)icestick-glitcher
Simple voltage glitcher implementation for the Lattice iCEstick Evaluation KitMAT
This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL serversbluetooth-keyboard-emulator
Simple proof-of-concept software tool for emulating Bluetooth BR/EDR (a.k.a. Bluetooth Classic) keyboardsldap-swak
LDAP Swiss Army Knifeslig
Siemens LOGO!8 PLC Password Hacking Proof-of-Concept-Toolldif2bloodhound
Convert an LDIF file to JSON files ingestible by BloodHoundLauschgeraet
Gets in the way of your victim's traffic and out of yoursnetns.sh
A simple script to make network namespaces more usableicebreaker-glitcher
Simple voltage glitcher implementation for the iCEBreaker FPGA boardbiometricks
Fun with biometricsSingle-User-BloodHound
Run BloodHound CE in a single-user setup with podmanradio-hackbox2
PoC tool to demonstrate vulnerabilities in wireless input devicesprotectimus-slim-proxmark3
Proxmark3 Lua script for attacking vulnerable Protectimus SLIM NFC TOTP hardware tokenssyss-crc
Simple Python CRC implementation for playing around with cyclic redundancy checkslogic2-atecc508-extension
Logic 2 High Level Protocol Analyzer for the Microchip ATECC508A I2C communication with support for I2C encryptioninvoke-lsaparse
PowerShell implementation for parsing LSA (Local Security Authority) process memory dumpsLove Open Source and this site? Check out how you can help us