The pentester's Swiss knife

bypass AV

Voidgate: bypass AV/EDR memory scanners

Voidgate A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions,...

pacu: an open-source AWS exploitation framework

What is Pacu? Pacu is an open-source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security Labs, Pacu allows penetration testers to exploit configuration flaws within...

malicious traffic detection

Maltrail: Malicious traffic detection system

Maltrail Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where the trail...

web log analyzer

GoAccess: A real-time web log analyzer

GoAccess GoAccess is an open-source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems or through your browser. It provides fast and valuable HTTP statistics for system administrators who require a visual server...

OSINT information

OSINT-Collector: The Comprehensive Framework for Targeted Intelligence Gathering

OSINT-Collector OSINT-Collector is an advanced framework that facilitates the collection, analysis, and management of OSINT information useful for conducting investigations in specific domains of interest. Design and Architecture In this framework has been used an Ontology approach: The OSINT Ontology describes how data extracted from...

recover deleted files

RecoverPy: Recover overwritten or deleted data

RecoverPy RecoverPy is a powerful tool that leverages your system capabilities to recover lost files. Unlike others, you can not only recover deleted files but also overwritten data. Every block of your partition will be...

Cyber Threat Intelligence Platform

OpenCTI: Open Cyber Threat Intelligence Platform

OpenCTI OpenCTI is an open-source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created to structure, store, organize, and visualize technical and non-technical information about cyber threats....

Find leaked credentials

trufflehog: Find leaked credentials

Truffle Hog Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed. How it works This module will go through the entire commit...