

SandBlaster: Reversing the Apple sandbox from Cellubrite LabsĪll-in-one OSINT tool for analysing any website POSTDump: Another tool to perform minidump of LSASS process using few technics to avoid detection.ĮchoDrv: Tool permitting to abuse Kernel read/write vulnerability in ECHOAC anti-cheat driver echo_driver.sysĪssociated-Threat-Analyzer - Detects Malicious IPv4 Addresses And Domain Names Associated With Your Web Application Using Local Malicious Domain And IPv4 Listsĭtlspipes: Generic DTLS wrapper for UDP sessionsĭNSWatch - DNS Traffic Sniffer and AnalyzerĬrackMapExec: A swiss army knife for pentesting networksįavFreak: Making Favicon.ico based Recon Great again ! Perfect-loader: Load a dynamic library from memory by modifying the native Windows loaderĪbusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.ĮDRaser - Tool For Remotely Deleting Access Logs, Windows Event Logs, Databases, And Other Filesīypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtimeĬheat sheet that contains common enumeration and attack methods for Windows Active Directory.įully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation) Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks RecycledInjector - Native Syscalls Shellcode InjectorĬonfig Extraction from in-memory CobaltStrike Beacons Threat9/routersploit: Exploitation Framework for Embedded Devices

It is designed to be used in conjunction with a SIEM or other log aggregation tool It allows you to utilize and enhance the power of BloodHound in a more automated fashion.
