Offline Exploit-DB CLI.
Outils pour endpoints
Workstations, servers and EDR-managed devices.
122 tools indexed
Open SOC distribution.
Payload generation framework.
.NET post-exploitation library.
Remote SSH for the edge.
Open-source SOAR.
Vendor-agnostic detection rules.
Open-source adversary emulation framework.
Find juicy files on Windows shares.
Social-engineering attack framework.
CVE intelligence and exploit lookup CLI.
Build vulnerable instrumented labs.
Battle-tested Sysmon configuration.
Microsoft's Sysmon, on Linux.
All-in-one honeypot platform.
Send phishing via Microsoft Teams.
Zero-trust access for SSH, K8s and more.
eBPF-based runtime security.
Filesystem forensics library.
Open-source SIRP for incident response.
Cross-platform data-protection framework.
PowerShell downgrade attack.
UAC
—Unix-like artifact collector.
Defeat Windows User Account Control.