
Changelog EaST v1.0.0 rc: + New GUI(Graffic User Interface). + Module bug fixes. + command.py, Modules.py and sploit.py with new gui. This software is necessary…

Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose…

The printf function in C is vulnerable to attacks using incorrect format specifiers and corresponding incorrect or unequal parameters. ‘safeprintf’ is a library that would…

PywerView script makes it so easy to find vulnerable machines, or list what domain users were added to the local Administrators group of a machine,…

Changelog v2.2.1: * New features ++ Threaded support for scanners which makes them waaay faster! (see scanners/autopwn( https://github.com/reverse-shell/routersploit/blob/master/routersploit/modules/scanners/autopwn.py) implementation for details). The RouteSploit Framework is…

Changelog v1.1.6 (August 8, 2016): * Features: ++ Encoder +-+ Added md5, sha1, sha256 hashing methods ++ Payloads +-+ Added Add user to remote desktop…

Fenrir is a simple IOC scanner bash script. It allows scanning Linux/Unix/OSX systems for the following Indicators of Compromise (IOCs): + Hashes ** MD5, SHA1…