The pentester's Swiss knife

bypass AV

Voidgate: bypass AV/EDR memory scanners

Voidgate A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions,...

malicious traffic detection

Maltrail: Malicious traffic detection system

Maltrail Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where the trail...

web log analyzer

GoAccess: A real-time web log analyzer

GoAccess GoAccess is an open-source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems or through your browser. It provides fast and valuable HTTP statistics for system administrators who require a visual server...

OSINT information

OSINT-Collector: The Comprehensive Framework for Targeted Intelligence Gathering

OSINT-Collector OSINT-Collector is an advanced framework that facilitates the collection, analysis, and management of OSINT information useful for conducting investigations in specific domains of interest. Design and Architecture In this framework has been used an Ontology approach: The OSINT Ontology describes how data extracted from...

recover deleted files

RecoverPy: Recover overwritten or deleted data

RecoverPy RecoverPy is a powerful tool that leverages your system capabilities to recover lost files. Unlike others, you can not only recover deleted files but also overwritten data. Every block of your partition will be...