Skype Log Viewer – Download and View Skype History Without Skype

Skype Log Viewer - Download and View Skype History Without Skype Download and View Skype History Without Skype.This program allows you to view all of your skype chat logs and then easily export them as text files.It correctly organizes them by conversation, and makes sure that group conversations do not get jumbled with one on

OnionShare – Securely and anonymously share a file of any size

OnionShare - Securely and anonymously share a file of any size OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn't require setting up a server

SimpleWall – Simple tool to configure Windows Filtering Platform (WFP)

SimpleWall - Simple tool to configure Windows Filtering Platform (WFP) Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer.The lightweight application is less than a megabyte, and it is compatible with Windows Vista and higher operating systems. You can download either the installer or portable version. For correct

Tilt – Terminal Ip Lookup Tool

Tilt - Terminal Ip Lookup Tool Tilt: Terminal ip lookup tool, is an easy and simple open source tool implemented in Python for ip/host passive reconnaissance. It's very handy for first reconnaissance approach and for host data retrieval.FeaturesHost to IP conversionIP to Host conversionDNS to IPsGeoIP TranslationExtensive information gathering trough Host-nameWhois with:Registrar infoDatesName ServerSiteStatusOwner informationAdditional

Excalibur – An Eternalblue exploit payload based Powershell

Excalibur - An Eternalblue exploit payload based Powershell Excalibur is an Eternalblue exploit based Powershell for the Bashbunny project. It's purpose is to reflect on how a simple USB drive can execute the 7 cyber kill chain. Excalibur may be used only for demostrations purposes only, and the developers are not responsible to any misuse

Phishing Catcher – Catching malicious phishing domain names using Certstream SSL certificates live stream

Phishing Catcher - Catching malicious phishing domain names using Certstream SSL certificates live stream Catching malicious phishing domain names using certstream SSL certificates live stream.This is just a working PoC, feel free to contribute and tweak the code to fit your needs.InstallationThe script should work fine using Python2 or Python3.You will need the following python

SpookFlare – Meterpreter Loader Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures

SpookFlare - Meterpreter Loader Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection. SpookFlare is a loader generator for Meterpreter Reverse HTTP and HTTPS stages. SpookFlare has

Enigma – Multiplatform Payload Dropper

Enigma - Multiplatform Payload Dropper Enigma is a Multiplatform payload dropper.Rungit clone https://github.com/UndeadSec/Enigma.gitcd Enigmapython enigma.pyorpython3 enigma3.pyPrerequisites python 2.7 for enigma.pypython 3.x for enigma.pymetasploitTested on Kali Linux - ROLLING EDITIONVideo Download

DumpsterFire – Security Incidents In A Box!

DumpsterFire - Security Incidents In A Box! DumpsterFire Toolset - Security Incidents In A Box!The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support

ROC – Infineon RSA Vulnerability

ROC - Infineon RSA Vulnerability This tool is related to ACM CCS 2017 conference paper #124 Return of the Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli.It enables you to test public RSA keys for a presence of the described vulnerability.Update: The paper of the attack is already online, ACM version.Currently the tool supports