Arg-u
Beta
Newest
Discussions
Reader
Chat
BYOSI - Evade EDR's The Simple Way, By Not Touching Any Of The API's They Hook
Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs fail to scan sc...
0
kitploit.com
Windows
Scripting
Powershell
Scan
Redteam
EDR-Evasion
BYOSI
Edr-Bypass
Restrictions
0xba5e
0xba5e
•
0
0
...
DockerSpy - DockerSpy Searches For Images On Docker Hub And Extracts Sensitive Information Such As Authentication Secrets, Private Keys, And More
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.
0
kitploit.com
Research
Vulnerability
Vulnerabilities
Osint
Secrets
Uncover
Repositories
Regex
DockerSpy
Marnix
marnix
•
0
0
...
ModTracer - ModTracer Finds Hidden Linux Kernel Rootkits And Then Make Visible Again
ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.
0
kitploit.com
Forensics
Linux
Rootkit
Kernel
Hidden
Lkm
ModTracer
Legend
legend
•
0
0
...
Hfinger - Fingerprinting HTTP Requests
Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main objective i...
0
kitploit.com
Python
Reporting
Sandbox
Network-Analysis
Hfinger
Pcap
Tshark
Theta
theta
•
0
0
...
VulnNodeApp - A Vulnerable Node.Js Application
A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes o...
0
kitploit.com
Vulnerability
Vulnerabilities
Scripting
Vulnerable
VulnNodeApp
Security
security
•
0
0
...
XMGoat - Composed of XM Cyber terraform templates that help you learn about common Azure security issues
XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template is a vulnerab...
0
kitploit.com
Terraform
Vulnerable
XMGoat
Legend
legend
•
0
0
...
Extrude - Analyse Binaries For Missing Security Features, Information Disclosure And More...
Analyse binaries for missing security features, information disclosure and more. Extrude is in the early stages of development, and curren...
0
kitploit.com
NX
Portable-Executable
Extrude
Relro
Gamma
gamma
•
0
0
...
Volana - Shell Command Obfuscation To Avoid Detection Systems
Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth . For this reason you shou...
0
kitploit.com
Exploitation
Pentest
Infosec
Redteam
Pentest-Tool
Obfuscator
Shell-Obfuscate
Volana
Marnix
marnix
•
0
0
...
NativeDump - Dump Lsass Using Only Native APIs By Hand-Crafting Minidump Files (Without MinidumpWriteDump!)
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tool...
0
kitploit.com
Windows
Mimikatz
Redteam-Tools
Security-Tools
Undocumented
Pypykatz
Lsass-Dump
NativeDump
Zheng
zheng
•
0
0
...
Sttr - Cross-Platform, Cli App To Perform Various Operations On String
sttr is command line software that allows you to quickly run various transformation operations on the string.
0
kitploit.com
Cli-Tool
Devutils
Encrypt
Encryption-Decryption
Sttr
Termux
Termux-Tool
Tui-App
Zeropad
Zheng
zheng
•
0
0
...
EvilSlackbot - A Slack Bot Phishing Framework For Red Teaming Exercises
EvilSlackbot A Slack Attack Framework for conducting Red Team and phishing exercises within Slack workspaces. Disclaimer This tool...
0
kitploit.com
Phishing
Slack
Framework
Secrets
Python3
Secret
EvilSlackbot
Leaked
Nexus
nexus
•
0
0
...
Reaper - Proof Of Concept On BYOVD Attack
Reaper is a proof-of-concept designed to exploit BYOVD (Bring Your Own Vulnerable Driver ) driver vulnerability . This malicious technique...
0
kitploit.com
Windows
Vulnerability
Vulnerable
Driver
Reaper
Snappy
snappy
•
0
0
...
Ars0N-Framework - A Modern Framework For Bug Bounty Hunting
Howdy! My name is Harrison Richardson, or rs0n (arson) when I want to feel cooler than I really am. The code in this repository started ...
0
kitploit.com
YouTube
Vast
Transparency
Subdomain
Subdomains
Troubleshooting
Subfinder
Ars0N-Framework
Shuffledns
Sublist3R
Marnix
marnix
•
0
0
...
LDAPWordlistHarvester - A Tool To Generate A Wordlist From The Information Present In LDAP, In Order To Crack Passwords Of Domain Accounts
A tool to generate a wordlist from the information present in LDAP, in order to crack non-random passwords of domain accounts.
0
kitploit.com
Python
Powershell
Active-Directory
Wordlist
LDAPWordlistHarvester
Ntds
Marnix
marnix
•
0
0
...
Pyrit - The Famous WPA Precomputed Cracker
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the...
0
kitploit.com
Vulnerability
Vulnerable
Python3
Toolkit
PyRIT
Packet
Python2
SHA1
0xba5e
0xba5e
•
0
0
...
Presentation: Architecting for Data Products
New Platform sbomify Streamlines Making Software Inventories for SBOMs
.NET 9 Release Candidate 1: Approaching Final Release with Updates Across the Framework
Microsoft's Customer Managed Planned Failover Type for Azure Storage Available in Public Preview
Article: Curating Developer Experience: Practical Insights from Building a Platform Team
LAKE Announces Sponsorship Of Homeless World Cup Seoul 2024, Championing Social Impact And Community Support
Telos Foundation And Binance To Launch Telos X Crypto Trading Platform
Wukong Begins Airdrop, Attracting More Bitcoin Users To Fractal Environment