1. Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
2. DrozerThe Leading Security Assessment Framework for Android.
4. AzuriteEnumeration and reconnaissance activities in the Microsoft Azure Cloud.
5. Captcha22CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.
6. SharpcliphistorySharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 starting from the 1809 Build.
8. NinjasploitA meterpreter extension for applying hooks to avoid windows defender memory scans
9. XrulezA command line tool for creating malicious outlook rules
11. PeasPEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.
17. C3Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
18. AwspxA graph-based tool for visualizing effective access and resource relationships in AWS environments.
19. Dref DNS Rebinding Exploitation Framework
20. SharpgpoabuseSharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
23. WepwniseWePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
24. LeonidasAutomated Attack Simulation in the Cloud, complete with detection use cases.
26. AthenaGUI Tool to generate threat intelligence information in various formats
27. timeinatorTimeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.
31. jASMinNo description, website, or topics provided.
32. CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
33. LinuxCatScaleIncident Response collection and processing scripts with automated reporting scripts
38. fingertec-toolA tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices
40. CVE-2021-25374 Samsung-Account-AccessThis script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.