GPG Reaper – Obtain/Steal/Restore GPG Private Keys From Gpg-Agent Cache/Memory

GPG Reaper - Obtain/Steal/Restore GPG Private Keys From Gpg-Agent Cache/Memory Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memoryThis POC demonstrates method for obtaining GPG private keys from gpg-agent memory under Windows.Normally this should be possible only within 10 minutes time frame (--default-cache-ttl value).Unfortunately housekeeping() function (which is responsible for cache cleanup) is executed only if you

Hashtopolis – A Hashcat Wrapper For Distributed Hashcracking

Hashtopolis - A Hashcat Wrapper For Distributed Hashcracking Hashtopolis is a multi-platform client-server tool for distributing hashcat tasks to multiple computers. The main goals for Hashtopolis's development are portability, robustness, multi-user support, and multiple groups management. The application has two parts:Agent Multiple clients (C#, Python), easily customizable to suit any need.Server several PHP/CSS files

Tinfoleak v2.4 – The Most Complete Open-Source Tool For Twitter Intelligence Analysis

Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis The most complete open-source tool for Twitter intelligence analysisIntroductiontinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines, that automates the extraction of information on Twitter and facilitates subsequent analysis for the generation of intelligence. Taking

MalScan – A Simple PE File Heuristics Scanners

MalScan - A Simple PE File Heuristics Scanners MalScan is a simple PE File Heuristics Scanners written in python that you can use to quickly analyze a PE file and find out whether anything suspicious exists. It is a simple tool so doesn't offers much fancy features. You are free to extend it or do

AWS Pwn – A Collection Of AWS Penetration Testing Junk

AWS Pwn - A Collection Of AWS Penetration Testing Junk This is a collection of horribly written scripts for performing various tasks related to penetration testing AWS. Please don't be sad if it doesn't work for you. It might be that AWS has changed since a given tool was written or it might be that

Mimic – A Tool For Covert Execution In Linux

Mimic - A Tool For Covert Execution In Linux mimic is a tool for covert execution on Linux x86_64.What is covert execution?Covert execution is the art of hiding a process. In this case, mimic hides the process in plain sight. mimic can launch any program and make it look like any other program. Any user

ReconCat – Tool To Fetch Archive Url Snapshots From Archive.org

ReconCat - Tool To Fetch Archive Url Snapshots From Archive.org A small Php application to fetch archive url snapshots from archive.org.using it you can fetch complete list of snapshot urls of any year or complete list of all years possible.Made Specially for penetration testing purpose.This application is powered by WMB-ScrapperInstallationClone this repository,