Tools

115 posts

> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

AccessChk

Sysinternals tool to check permissions on files, services, and registry keys for privilege escalation

#privilege-escalation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ADB (Android Debug Bridge)

Android device management and debugging tool for installing apps and accessing device shell

#android#mobile-pentesting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Apktool

Android APK decompilation and recompilation tool for reverse engineering

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Autopsy

Digital forensics analysis platform for disk image examination and evidence recovery

#forensics#dfir#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

AWS CLI

AWS command-line interface for cloud infrastructure enumeration and reconnaissance

#cloud#aws#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Binwalk

Firmware analysis and file extraction tool for finding embedded files and executable code

#steganography#forensics#ctf
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

BloodHound

Active Directory relationship mapping and attack path visualization tool

#active-directory#windows#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Cadaver

WebDAV client for uploading and managing files on WebDAV-enabled servers

#webdav#web#file-upload
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Certipy

Active Directory Certificate Services enumeration and exploitation tool

#active-directory#windows#certificate-abuse
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

CeWL

Custom wordlist generator that spiders websites to create targeted password lists

#password-cracking#wordlist#web
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Checksec

Checks security properties of binaries including NX, RELRO, Stack Canaries, and PIE

#binary-exploitation#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Chisel

TCP/UDP tunnel over HTTP for pivoting and port forwarding through firewalls

#tunneling#pivoting#port-forwarding
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

CrackMapExec

Swiss army knife for pentesting Windows/Active Directory environments

#active-directory#windows#smb
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Crunch

Wordlist generator that creates custom character-based password lists

#password-cracking#wordlist
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

DAVTest

WebDAV exploitation testing tool for checking upload capabilities and file execution

#webdav#web#exploitation
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

dex2jar

Converts Android DEX files to Java JAR format for decompilation and analysis

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Dirsearch

Web path discovery tool for brute-forcing directories and files on web servers

#web#directory-bruteforce#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

DNSenum

DNS enumeration tool for discovering subdomains, zone transfers, and DNS records

#dns#enumeration#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

DNSmap

DNS subdomain brute-forcing tool for discovering hidden subdomains

#dns#enumeration#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

DNSrecon

DNS reconnaissance tool for zone transfers, subdomain enumeration, and record queries

#dns#enumeration#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

EfsPotato

Windows privilege escalation tool exploiting EFS service for token impersonation

#privilege-escalation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Enum4linux

Linux tool for enumerating Windows/Samba shares, users, and groups via SMB

#smb#enumeration#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Evil-WinRM

Windows Remote Management shell for penetration testing with pass-the-hash support

#remote-access#windows#active-directory
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ExifTool

Metadata reader and editor for extracting information from files and images

#forensics#steganography#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ffuf

Fast web fuzzer for directory discovery, virtual host enumeration, and parameter fuzzing

#web#directory-bruteforce#fuzzing
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Fierce

DNS reconnaissance and brute-force tool for locating non-contiguous IP space

#dns#enumeration#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

FOCA

Metadata extraction and fingerprinting tool for harvesting information from documents

#reconnaissance#metadata#osint
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Foremost

File carving tool for recovering files from disk images based on headers and footers

#forensics#file-recovery#ctf
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Frida

Dynamic instrumentation toolkit for mobile and desktop application security testing

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

FTK Imager

Forensic disk imaging and evidence extraction tool for creating and analyzing disk images

#forensics#dfir#disk-imaging
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

GDB

GNU Debugger for binary exploitation, reverse engineering, and debugging executables

#binary-exploitation#reverse-engineering#debugging
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

git-dumper

Tool for dumping exposed .git repositories from web servers

#web#reconnaissance#git
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Gobuster

Directory and DNS brute-forcing tool for discovering hidden paths and subdomains

#web#directory-bruteforce#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

GoPhish

Open-source phishing framework for simulating phishing campaigns and security awareness

#phishing#social-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

gpg2john

Extracts password hashes from GPG/PGP encrypted files for cracking with John

#password-cracking#hash-extraction
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Hashcat

GPU-accelerated password recovery tool supporting hundreds of hash types

#password-cracking#hash-cracking
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

hping3

TCP/IP packet assembler and analyzer for custom packet crafting and network scanning

#scanning#networking#packet-crafting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Hydra

Network login brute-forcer supporting numerous protocols including SSH, FTP, HTTP, and SMB

#password-cracking#brute-force
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-GetNPUsers

AS-REP Roasting tool to extract hashes for accounts with Kerberos pre-auth disabled

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-GetUserSPNs

Kerberoasting tool to request and extract service ticket hashes for offline cracking

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-lookupsid

SID brute-forcing tool to enumerate domain users and groups via RPC

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-mssqlclient

MSSQL client for interacting with Microsoft SQL servers using Windows authentication

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-psexec

Remote command execution tool using SMB/RPC for lateral movement in Windows environments

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-secretsdump

Extracts credentials and secrets from Windows systems including SAM, LSA, and NTDS.dit

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-smbserver

Sets up a quick SMB server for file transfers during penetration testing

#windows#impacket#file-transfer
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-wmiexec

Remote command execution using WMI for stealthy lateral movement without writing to disk

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

InviShell

Bypasses PowerShell security features like logging and AMSI for stealthy script execution

#active-directory#windows#av-evasion
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

jadx-gui

Android APK decompiler with GUI that opens APK files directly for source code analysis

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

JD-GUI

Java decompiler GUI for viewing decompiled Java source from JAR and class files

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

John the Ripper

Password cracker supporting many hash types with wordlist and rule-based attacks

#password-cracking#hash-cracking
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

JuicyPotato

Windows privilege escalation tool exploiting SeImpersonatePrivilege via COM server abuse

#privilege-escalation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

keepass2john

Extracts password hashes from KeePass database files for offline cracking

#password-cracking#hash-extraction
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Kerbrute

Kerberos brute-forcing tool for AD username enumeration and password spraying

#active-directory#windows#kerberos
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ldapsearch

LDAP query tool for enumerating Active Directory objects, users, and groups

#active-directory#enumeration#ldap
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

LinEnum

Linux privilege escalation enumeration script that checks for common misconfigurations

#privilege-escalation#linux#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

LinPEAS

Linux Privilege Escalation Awesome Script for automated enumeration of escalation vectors

#privilege-escalation#linux#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Linux Exploit Suggester

Identifies potential kernel exploits for Linux privilege escalation based on kernel version

#privilege-escalation#linux#kernel-exploits
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ltrace

Library call tracer for tracking shared library function calls in binary analysis

#binary-exploitation#reverse-engineering#debugging
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Medusa

Parallel network login brute-forcer supporting multiple protocols and services

#password-cracking#brute-force
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Mimikatz

Windows credential extraction tool for dumping passwords, hashes, and Kerberos tickets

#active-directory#windows#credential-dumping
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Metasploit (msfconsole)

Exploitation framework with modules for scanning, exploitation, and post-exploitation

#exploitation#metasploit#post-exploitation
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

msfvenom

Payload generator for creating shellcode, reverse shells, and encoded payloads

#exploitation#metasploit#payload-generation
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

nbtscan

NetBIOS name scanner for discovering Windows hosts and their NetBIOS information

#scanning#enumeration#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

net rpc

Samba utility for managing Windows remote resources including password changes and group membership

#active-directory#windows#smb
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Netcat

Network utility for reading and writing data across TCP/UDP connections and reverse shells

#networking#reverse-shell#file-transfer
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Netsh

Windows network configuration tool used for port forwarding and firewall management

#tunneling#port-forwarding#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Nmap

Network scanner for port discovery, service detection, OS fingerprinting, and script scanning

#scanning#enumeration#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Objection

Mobile exploration toolkit powered by Frida for runtime security testing

#android#mobile-pentesting#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

onesixtyone

Fast SNMP community string brute-forcer for discovering SNMP-enabled devices

#scanning#enumeration#snmp
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

OpenSSL

Cryptographic toolkit for SSL/TLS operations, certificate management, and encryption

#cryptography#networking#utility
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

OpenStego

Steganography tool for hiding and extracting secret data within image files

#steganography#ctf#forensics
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

pfx2john

Extracts password hashes from PFX/PKCS12 certificate files for cracking with John

#password-cracking#hash-extraction
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Plink

PuTTY command-line SSH client for port forwarding and tunneling from Windows

#tunneling#port-forwarding#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Powercat

PowerShell implementation of netcat for reverse shells and file transfers

#reverse-shell#windows#powershell
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

PowerUp

PowerShell privilege escalation tool that checks for common Windows misconfigurations

#privilege-escalation#windows#powershell
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

PowerUpSQL

PowerShell toolkit for attacking SQL Server instances in Active Directory environments

#active-directory#windows#database
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

PowerView

PowerShell tool for Active Directory enumeration and domain reconnaissance

#active-directory#windows#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

PrintSpoofer

Windows privilege escalation tool exploiting SeImpersonatePrivilege via print spooler

#privilege-escalation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Proxychains

Forces TCP connections through proxy servers like SOCKS4/5 for pivoting through networks

#tunneling#pivoting#proxying
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

pwntools

Python CTF framework and exploit development library for binary exploitation

#binary-exploitation#ctf#python
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

rdesktop

Open-source RDP client for connecting to Windows Remote Desktop services from Linux

#remote-access#windows#rdp
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Responder

LLMNR/NBT-NS/mDNS poisoner for capturing NTLMv2 hashes on the network

#active-directory#windows#credential-capture
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

RITA

Real Intelligence Threat Analytics framework for detecting C2 beacons and DNS tunneling

#blue-team#dfir#threat-hunting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

ROPgadget

Searches binary files for ROP gadgets to build Return-Oriented Programming chains

#binary-exploitation#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Ropper

ROP gadget finder and chain builder for binary exploitation

#binary-exploitation#reverse-engineering
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

rpcclient

Samba RPC client for enumerating users, groups, and shares on Windows systems

#enumeration#windows#smb
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Rubeus

C# Kerberos abuse toolkit for AS-REP roasting, Kerberoasting, and ticket manipulation

#active-directory#windows#kerberos
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

SearchSploit

Offline exploit database search tool for finding public exploits and shellcodes

#exploitation#reconnaissance
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

SharpHound

BloodHound data collector that gathers Active Directory relationship data

#active-directory#windows#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Shellter

Dynamic shellcode injection tool for AV evasion by injecting payloads into legitimate PE files

#av-evasion#exploitation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Showmount

NFS enumeration tool for listing exported shares on remote servers

#enumeration#nfs#linux
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

smbclient

SMB client for accessing and interacting with Windows file shares from Linux

#smb#enumeration#file-transfer
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

SMBMap

SMB share enumeration tool for listing shares, permissions, and accessing files

#smb#enumeration#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

snmpwalk

SNMP enumeration tool for querying MIB trees and extracting device information

#scanning#enumeration#snmp
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Socat

Multipurpose relay tool for bidirectional data transfer and port forwarding

#tunneling#port-forwarding#networking
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

SQLMap

Automated SQL injection detection and exploitation tool for database takeover

#web#sql-injection#exploitation
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

sshuttle

Transparent proxy VPN over SSH for routing traffic through a pivot host

#tunneling#pivoting#ssh
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

StegCracker

Steganography brute-force tool for cracking steghide passwords on image files

#steganography#password-cracking#ctf
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Steghide

Steganography tool for embedding and extracting hidden data in JPEG and BMP files

#steganography#ctf
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

strace

System call tracer for analyzing binary behavior and privilege escalation analysis

#binary-exploitation#privilege-escalation#linux
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Suricata

Open-source IDS/IPS for network traffic analysis and threat detection using signatures

#blue-team#ids-ips#network-analysis
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Swaks

Swiss Army Knife for SMTP testing and sending crafted emails for phishing assessments

#smtp#phishing#networking
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

tcpdump

Command-line packet analyzer for capturing and filtering network traffic

#networking#packet-capture#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

unix-privesc-check

Unix privilege escalation checker script that identifies common misconfigurations

#privilege-escalation#linux#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Velociraptor

Open-source DFIR platform for endpoint monitoring, collection, and threat hunting

#dfir#blue-team#threat-hunting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Volatility

Memory forensics framework for analyzing RAM dumps and extracting artifacts

#forensics#dfir#memory-analysis
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Wfuzz

Web application fuzzer for brute-forcing parameters, directories, and forms

#web#fuzzing#directory-bruteforce
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Windows Exploit Suggester

Identifies potential privilege escalation vulnerabilities based on Windows systeminfo output

#privilege-escalation#windows
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

WinPEAS

Windows Privilege Escalation Awesome Script for automated enumeration of escalation vectors

#privilege-escalation#windows#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Wireshark

Network protocol analyzer with GUI for deep inspection of packet captures

#networking#packet-capture#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

WPScan

WordPress security scanner for enumerating plugins, themes, and user accounts

#web#wordpress#enumeration
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

xfreerdp

FreeRDP client for connecting to Windows Remote Desktop with pass-the-hash support

#remote-access#windows#rdp
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

Zeek

Network security monitor that converts packet captures into structured log files

#blue-team#network-analysis#dfir
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

zip2john

Extracts password hashes from encrypted ZIP files for cracking with John the Ripper

#password-cracking#hash-extraction
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

zsteg

PNG/BMP steganography detection tool for finding hidden data in image LSB channels

#steganography#ctf