The pentester's Swiss knife

abuses Kerberos

Rubeus: C# toolset for raw Kerberos interaction and abuses

Rubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy’s Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX‘s MakeMeEnterpriseAdmin project (GPL v3.0 license). Full credit goes to Benjamin and Vincent for...

Suricata

Suricata: network IDS, IPS and NSM engine

What is Suricata The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry but...

pypykatz

pypykatz: Mimikatz implementation in pure Python

pypykatz Mimikatz implementation in pure Python Why do I need these dumps files? To create mimikatz in Python, one would have to create structure definitions of a gazillion different structures (check the original code)...

MemProcFS

MemProcFS: The Memory Process File System

The Memory Process File System: The Memory Process File System (MemProcFS) is an easy and convenient way of accessing physical memory as files a virtual file system. Easy trivial point-and-click memory analysis without the...

BurpSuite exention

HaE: BurpSuite Highlighter and Extractor

HaE – Highlighter and Extractor HaE is used to highlight HTTP requests and extract information from HTTP response messages or request messages.   The plugin can custom regular expressions to match HTTP response messages. You can decide...

Attack Simulation Platform

OpenBAS: Open Breach and Attack Simulation Platform

OpenBAS OpenBAS is an open-source platform allowing organizations to plan, schedule, and conduct cyber adversary simulation campaigns and tests. The goal is to create a powerful, reliable, and open-source tool to effectively plan and...

recover deleted files

RecoverPy: Recover overwritten or deleted data

RecoverPy You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your request....

Reverse Shells

EchoStrike: Undetectable Reverse Shells with a Pythonic Twist

EchoStrike EchoStrike is a tool designed to generate undetectable reverse shells and perform process injection on Windows systems. Through an interactive wizard written in Python, users can customize their binaries with advanced persistence and encryption techniques. The malware code is written...

Security Assessment tool

Cloudsplaining: an AWS IAM Security Assessment tool

Cloudsplaining Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report. Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a...