Domain Hunter
A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.
Given a suspected phishing url or file of line separated urls, visit, screenshot, and scrape for interesting files. Visit a suspected phishing page, screenshot it and pillage it for phishing archives. Example of reading in a single url: `$ python bucklegripper.py -s openphish -u http://www.govwebsearch.com/apc/opc/pdp/safe/optusnet.com.au/Login.html`.
A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.
A Linux-based environment for penetration testing and vulnerability exploitation
A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.
A specification/framework for extending default C2 communication channels in Cobalt Strike
Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.