Pupy – Cross-Platform (Windows, Linux, OSX, Android) Remote Administration & Post-Exploitation Tool

What is Puppy? Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) and post-exploitation tool mainly written in python. It features an all-in-memory execution…

Read more »
Fake SMS - A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy - Create and Register Fake Phone Number

Fake-SMS – a Tool Which Can Skip Phone Number Based SMS Verification by Using a Temporary Phone Number

Fake-SMS A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy. Note-1: This is…

Read more »
Vibe - Framework For Stealthy Domain Reconnaissance

Vibe – Framework For Stealthy Domain Reconnaissance

Vibe is a tool designed to pulling down all information about a domain, allowing users to perform the same domain net commands offline.

Read more »
HRShell - An HTTPS HTTP Reverse Shell built with Flask xploitlab

HRShell – An HTTP/HTTPS Reverse Shell built with Flask

HRShell is an advanced HTTP(S) Reverse Shell built with Flask. With TLS support HRShell is capable run server on both HTTP & HTTPS.

Read more »
PostShell Post Exploitation Bind Backconnect Shell xploitlab

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control.

Read more »

Botb – Container Analysis, Exploitation And CICD Tool For Pentesters And Engineers

BOtB is the first tool aimed at hackers and developers to automate Container exploitation and which can be used to analyze and identify vulnerabilities.

Read more »
barq logo - The AWS Cloud Post Exploitation Framework xploitlab

barq – The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. perform enumeration and extraction.

Read more »