
Disclaimer This tool has been published educational purposes in order to teach people how bad guys could track them or monitor them or obtain information…

subjack is a Hostile Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to…

Changelog build v3.0.972: [2017-10-06] Enable KPH for Win10 insider previews (dmex) [2017-10-06] Move DbgHelp code into appsup, Improve mainwnd linking (dmex) [2017-10-06] Improve KPH error…

libbde is a library to access the BitLocker Drive Encryption (BDE) format. BitLocker Drive Encryption (BDE) is a volume-based encryption method used by Microsoft Windows,…

Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today’s Internet deployed servers and the unique needs of…

Ironsquirrel project aims at delivering browser exploits to the victim browser in an encrypted fashion. Ellyptic-curve Diffie-Hellman (secp256k1) is used for key agreement and AES…

Invoke-ATTACKAPI is A PowerShell script to interact with the MITRE ATT&CK Framework via its own API in order to gather information about techniques, tactics, groups,…

SCUTUM is an ARP firewall that prevents your computer from being ARP-spoofed by other computers on LAN. SCUTUM controls “arptables” in your computer so it…