CPUFetch : Simplistic Yet Fancy CPU Architecture Fetching Tool
CPUFetch is a simple yet fancy CPU architecture fetching tool. Support cpufetch supports x86, x86_64 (Intel and AMD) and ARM. Platformx86_64ARMNotesGNU/Linux✔️✔️Best supportWindows✔️❌Some information may be missing.Colors will be used if supportedAndroid❗✔️Some information may be missing.Not tested under x86_64macOS✔️❌Some information may be missing.Apple M1 support may be addedin the future (see #47) Installation Building from source Just clone the repo and use make to compile it git...
AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile. Any incoming requests that do not share the profiles user-agent, URI paths, headers, and query parameters, will be redirected to a configurable decoy website. The validated C2 traffic is relayed to a team...
SNOWCRASH : A Polyglot Payload Generator
SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded into a single polyglot template, which is platform-agnostic. There are few payloads available, including command execution, reverse shell establishment, binary execution and some more :> Basic Usage Install dependencies: ./install.shList available payloads: ./snowcrash...
PoisonApple : macOS Persistence Tool
PoisonApple is a command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters for cyber threat emulation purposes. Install Do it up: $ pip3 install poisonapple --user Note: PoisonApple was written & tested using Python 3.9, it should work using Python 3.6+ Important Notes! PoisonApple will make modifications to your macOS system, it's advised...
Max : Maximizing BloodHound With A Simple Suite Of Tools
Description New Release:dpat - The BloodHound Domain Password Audit Tool (DPAT)A simple suite of tools:get-info - Pull lists of information from the Neo4j databasemark-owned - Mark a list of objects as Ownedmark-hvt - Mark a list of objects as High Value Targetsquery - Run a raw Cypher query and return outputexport - Export all outbound controlling privileges of a domain...
NtHiM : Super Fast Sub-domain Takeover Detection
NtHiM is a super Fast Sub-domain Takeover Detection. Installation Method 1: Using Pre-compiled Binaries The pre-compiled binaries for different systems are available in the Releases page. You can download the one suitable for your system, unzip the file and start using NtHiM. Method 2: Using Crates.io NtHiM is available on Crates.io. So, if you have Rust installed on your system, you can simply install...
Columbo : A Computer Forensic Analysis Tool Used To Simplify & Identify Specific Patterns In Compromised Datasets
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down data to small sections and uses pattern recognition and machine learning models to identify adversaries behaviour and their possible locations in compromised Windows platforms in a form of suggestions. Currently Columbo operates on Windows platform. Dependencies & High Level Architecture Columbo...
Burpsuite : Copy As XMLHttpRequest Extension
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies PoC development when exploiting XSS. Installation download the latest JAR from releases or build manuallyadd JAR to burpsuite using tabs: "Extender" -> "Extensions" -> "Add" Usage select one request from any tab or a few requests in "Proxy" -> "HTTP history" tabinvoke context...
Scylla : The Simplistic Information Gathering Engine
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts, websites/webservers, phone numbers, and names. Scylla also allows users to find all social media profiles (main platforms) assigned to a certain username. In continuation, Scylla has shodan support so you can search for devices all over the internet, it...
UAC : Unix-like Artifacts Collector
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. It respects the order of volatility and artifacts that are changed during the execution. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. UAC can...















