Category Archives: Open-Source

APT2 – Automated Penetration Testing Toolkit

APT2 is an automated pentest tool that you can use to exploit a vulnerability already discovered by scanners.

EmPyre – post-exploitation OS X/Linux agent

EmPyre - RAT (Remote Access Trojan) EmPyre is a pure Python post-exploitation agent built on cryptologically-secure communications and a flexible architecture.

Pocsuite – Remote Vulnerability Testing Framework

Scanning systems is very important when you are evaluating the security on your internal assets. One of the tools that can be used during a security assessment is Pocsuite.

Mimikittenz- A post-exploitation PowerShell Tool

mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes

GOLANG – Trojan That Uses Twitter as a C&C server

Botnet

GoAT (Golang Advanced Trojan) is a trojan made in Go, using Twitter as a the C&C server. GoAT has some very unique and impressive capabilities

sems – Sandbox and Virtual Machine Detection Tool

sems is a good tool that can be used by malware researchers to verify if the existing virtual environment detected by malwares.

TLS-Attacker – Java-based Framework for Analyzing TLS Libraries

TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is able to send arbitrary protocol messages in an arbitrary order to the TLS peer, and define their modifications using a provided interface.