The pentester's Swiss knife

Kubernetes analysis

kubesec: Security risk analysis for Kubernetes resources

kubesec Security risk analysis for Kubernetes resources   Download Kubesec is available as a: Docker container image at docker.io/kubesec/kubesec:v2 Linux/MacOS/Win binary (get the latest release) Kubernetes Admission Controller Kubectl plugin Or install the latest commit from...

Lateral Movement

Maestro: Abusing Intune for Lateral Movement over C2

Maestro Maestro is a post-exploitation tool designed to interact with Intune/EntraID from a C2 agent on a user’s workstation without requiring knowledge of the user’s password or Azure authentication flows, token manipulation, and web-based...

blue team tool

FalconHound: blue team multi-tool

FalconHound FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with an SIEM...

linux post exploitation framework

emp3r0r: Linux/Windows post exploitation framework

emp3r0r Linux/Windows post-exploitation framework made by Linux user features beautiful terminal UI, use tmux for window management multi-tasking, you don’t need to wait for any commands to finish basic API provided through Unix socket...

control over the Outlook desktop

pwnlook: an offensive post exploitation tool

pwnlook Pwnlook is an offensive post exploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it. What it does: List mailboxes List folders...

black-box vulnerability scanner

Wapiti: web-application vulnerability scanner

Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links...

LSASS memory

RustiveDump: dump the memory of the lsass.exe process

RustiveDump RustiveDump is a Rust-based tool designed to dump the memory of the lsass.exe process using only NT system calls. It creates a minimal minidump file from scratch, containing essential components like SystemInfo, ModuleList, and Memory64List, with support for XOR encryption and remote transmission....