• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

tool

  1. itsMe

    Reverse Engineering VMAttack - An automated VM disassembler and devirtualization tool [WIP!]

    This project is heavily work in progress and is being created as a study for me and new reversers in .NET VM to explore and learn about code obfuscation techniques and how to reverse engineer them. The main focus currently of this project is on .NET Reactor 6.9.0.0, which has a simple 1:1 CIL...
  2. S

    ThreatHound - tool which help you on your IR & Threat Hunting

    This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports...
  3. S

    DNSrecon-gui - tool With GUI for Linux

    DNSRecon is a Python-based tool for DNS scanning and enumeration. It offers various functionalities, including enumerating standard records (A, NS, SOA, and MX) for a specified domain and expanding top-level domains for a given domain. The tool comes with a user-friendly, graph-oriented...
  4. S

    Kali-Whoami => Privacy tool to keep you safe and anonymous

    Whoami is a user-friendly privacy and anonymity tool designed to provide a high level of security through its simple interface and easy-to-use features. The tool uses over 9 modules to ensure maximum anonymity and also comes equipped with a Bug fixer module that is currently under development to...
  5. itsMe

    Tool Ghost KMS 11.8.2

    Tool Ghost KMS is a tool that has made the interaction between the user and the activation system easier and clearer. Using the «Events» panel, which lists each step that occurs when using any of the options that you can see in small icons or words that, when clicked, perform a specific task...
  6. itsMe

    BlackStone: Pentesting Reporting Tool

    BlackStone project or “BlackStone Project” is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal...
  7. P

    WP Rank Math Pro - BEST WordPress SEO Tool Pro v3.0.31 (FEB 22 + v1.0.109)

    Hidden content Download Rank Math Pro - WordPress SEO Made Easy Nulled Free Premium Plugin Rank Math is the most powerful way to get BEST WordPress SEO tools added to your website. -Extra Benefits -Exclusive Facebook Club -Fastest SEO Plugin -SEO & Schema on Automation -Advanced...
  8. itsMe

    AMP Tool v1.0

    This is an automatic tool that recon and scans 1 number vulnerability for websites. Developed by Team Code AMP. Hidden content
  9. dEEpEst

    Emotet detection tool for Windows OS

    Emotet detection tool for Windows OS Hidden content
  10. itsMe

    SMM Matrix v3.0 - Social Media Marketing Tool - Nulled

    SMM Matrix is a social media marketing tool. This software includes almost everything for you need to do a social media marketing business. It has services lined up for every social media platform and hence is a very versatile platform. Be it likes, followers, views, or even general engagement...
  11. itsMe

    Phyton DosS - DOS tool to do DDOS attacks , fast , powerfull and with colors!

    What is an DosS tool? Well DoS tools used to do packet attacks on targeted ip/server/link with alot of package requests. Our DosS tool is pretty nice to Attack on a website , easy and clear Appereance!. Tool:     Made by SqLoSt     Current version is 2.1v ( please remove old version while...
  12. itsMe

    Phyton Sopper is an IP Adress Information and Lookup Tool

    Educational purposes only This script is owned by SqLoSt (as an developer and copyright owner) , you are free to share , modify and use this code but only for educational purposes any damage/threatment happend via script isn't developer's problem. using script for doxxing is forbidden. About...
  13. itsMe

    Infection Monkey v2.0 - An automated pentest tool

    The Infection Monkey is an open-source security tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self-propagate across a data center and reports success to a centralized Command and Control(C&C) server. Main...
  14. itsMe

    Phyton Spider Web - A tool for web attacks and bug bunties

    Crack hash types : ____________________ md5 ____________________ sha1 ____________________ sha224 ____________________ sha256 ____________________ sha384 ____________________ sha512 ____________________ blake2b ____________________ blake5b Find admin panel and subdomains...
  15. itsMe

    Cracking KingWords V1 | Keyword Tool | Scrape, Extract, Typos, Random Keywords

    Hidden content
  16. itsMe

    APT-Hunter v3.0 - Threat Hunting tool for windows event logs

    APT-Hunter is a Threat Hunting tool for windows event logs which made by the purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity. This tool will make good use of the windows event logs collected and make...
  17. itsMe

    Google Dorks Proxyless & Proxy Parser | Dork Tool

    Hidden content
  18. itsMe

    Cracking Combo Tool By MrRoot

    Beautiful UI Easy to use Support large list Undo action button Helper option Customize helper option Hidden content
  19. itsMe

    .NET New Theme Tool - C# & Vb.net

    New Theme Tool + Efict for C# and Vb.net Hidden content
  20. itsMe

    Condor - AVs/EDRs/XDRs Evasion tool

    Condor is a tool created to help pentesters bypass protections like AVs/EDRs/XDRs in the Windows operating system. Condor was developed in Python and has several advantages to help pentesters. Benefits     Easy to use     Bypass multiple AVs/EDRs/XDRs     Two XOR encryption process and an...
Back
Top