The pentester's Swiss knife

cloud-native monitoring system

nightingale: enterprise-level cloud-native monitoring system

Nightingale Nightingale is an enterprise-level cloud-native monitoring system, which can be used as a drop-in replacement for Prometheus for alerting and management. Nightingale is a cloud-native monitoring system by All-In-On design, that supports enterprise-class...

Kerberos abuse

Kerbeus-BOF: Beacon Object Files for Kerberos abuse

Kerbeus-BOF Beacon Object Files for Kerberos abuse. This is an implementation of some important features of the Rubeus project, written in C. The project features integration with the C2 frameworks Cobalt Strike and Havoc. Ticket requests and renewals asktgt...

wireless hacking

WHAD: Wireless HAcking Devices

What is WHAD? The cybersecurity community has published a lot of wireless hacking tools based on various hardware platforms and custom communication protocols specifically designed to work with associated software. This leads to hackers...

code analysis

betterscan: code analysis & automation platform

betterscan-ce It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech...

Wayback Machine

waymore: find even more links from the Wayback Machine

waymore The idea behind waymore is to find even more links from the Wayback Machine than other existing tools. ? The biggest difference between waymore and other tools is that it can also download the archived responses for URLs on...

discover security risks

Bearer: finds risks and vulnerabilities in your code

Bearer Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to discover, filter and prioritize security risks and vulnerabilities leading to sensitive data exposures (PII, PHI, PD). We...