HackGitToolkit's profile picture. This channel is dedicated to sharing cybersecurity tools.
👉Open Source Software
👉Penetration Testing
👉Red/BlueTeam
👉Online Labs
👉etc

HackTools

@HackGitToolkit

This channel is dedicated to sharing cybersecurity tools. 👉Open Source Software 👉Penetration Testing 👉Red/BlueTeam 👉Online Labs 👉etc

🚨 NextSploit — scanner/exploiter for CVE-2025-29927 (Next.js middleware auth bypass). It detects Next.js apps, checks vulnerable versions & can attempt middleware bypass for testing. If you run Next.js middleware: patch to latest release & add upstream auth layers. 👉…


HackTools a reposté

AdaptixC2 v0.8 is out! github.com/Adaptix-Framew… * AxScript: new events and functions * Added Targets Manager * Updated tunnels Full update details: adaptix-framework.gitbook.io/adaptix-framew…

hacker_ralf's tweet image. AdaptixC2 v0.8 is out!

github.com/Adaptix-Framew…

* AxScript: new events and functions
* Added Targets Manager
* Updated tunnels

Full update details: adaptix-framework.gitbook.io/adaptix-framew…

🚀 dockur/windows — Run full Windows inside a Docker container! ⌛ Auto-downloads & boots Windows (7,10,11, Server…) via KVM+QEMU. 🌐 Access via web UI or RDP instantly. Supports Docker Compose & Kubernetes. Perfect for sandbox testing or isolated envs. 👉…

HackGitToolkit's tweet image. 🚀 dockur/windows — Run full Windows inside a Docker container!
⌛ Auto-downloads & boots Windows (7,10,11, Server…) via KVM+QEMU.
🌐 Access via web UI or RDP instantly.
Supports Docker Compose & Kubernetes.
Perfect for sandbox testing or isolated envs.
👉…

🛡 OpenCVE — Open-source Vulnerability Intelligence Platform • Aggregates CVEs from MITRE, NVD, RedHat & more • Filter by vendor, product, CVSS, EPSS, CWE; save views & dashboards • Subscribe to alerts via email or webhook • Available as SaaS or self-hosted deployment 🔗…


🚨 CVE-2025-49667 — Win32K ICOMP double-free LPE PoC released! Exploitable on Windows 10 (1909–22H2); Windows 11 already patched Double-free → kernel pointer overwrite → SYSTEM 🔗 github.com/Yuri08loveElai… #CVE202549667 #LPE #Windows10 #Infosec


🚀 HexStrike-AI v6.0 — Autonomous AI C2 for pentesting • 150+ security tools powered by AI agents (Claude, GPT, Copilot) • Smart orchestration: tool selection, CVE analysis, exploit generation • Real-time visual dashboards & workflow automation 🔗 github.com/0x4m4/hexstrik…

HackGitToolkit's tweet image. 🚀 HexStrike-AI v6.0 — Autonomous AI C2 for pentesting
• 150+ security tools powered by AI agents (Claude, GPT, Copilot)
• Smart orchestration: tool selection, CVE analysis, exploit generation
• Real-time visual dashboards & workflow automation
🔗 github.com/0x4m4/hexstrik……

🛠 hoontr — A DLL hunting Swiss Army knife for red teamers! • stomphoont: find PE files with large .text sections • exporthoont: locate modules by export name substring • bytehoont: scan .text for specific byte sequences Rust, multi-threaded, stealthy DLL research tool 🔗…


🔥 Remote DLL Injection via Timer-based Shellcode Execution Use Windows thread pool timers to run shellcode stealthily in the target process—no remote threads, just hidden timer callbacks. A novel injection tactic that’s stealthier and EDR-resistant. 🔗 github.com/andreisss/Remo…


🔍 ReconFTW — Automate recon like a pro! • Subdomain enumeration, OSINT & vuln scanning (XSS, SSRF, SQLi, LFI…) • Port scanning, screenshots & directory fuzzing • Supports distributed Ax Framework, Docker, ARM, AI report generation 🔗 github.com/six2dez/reconf… #Recon #BugBounty

HackGitToolkit's tweet image. 🔍 ReconFTW — Automate recon like a pro!
• Subdomain enumeration, OSINT & vuln scanning (XSS, SSRF, SQLi, LFI…)
• Port scanning, screenshots & directory fuzzing
• Supports distributed Ax Framework, Docker, ARM, AI report generation
🔗 github.com/six2dez/reconf…
#Recon #BugBounty…

🎯 BeaconatorC2 — Modular C2 framework for red teaming & adversarial emulation! • Schema-driven GUI dynamically adapts to each beacon’s capabilities • Supports HTTP/TCP/UDP/SMB & Meterpreter, with built-in base64/XOR/ROT handling 🔗 github.com/CroodSolutions… #RedTeam #C2


🚀 ChromeAlone — Turn Chrome into a C2 implant! Leverages legacy & modern Chrome features for: • raw TCP proxying • YubiKey phishing • cookie & credential dumping • keystroke logging • shell execution via WebAssembly Bypassed AVs 🔗 github.com/praetorian-inc… #RedTeam


🚀 TheFatRat — An easy-to-use exploit tool integrating MSFvenom & Metasploit to generate cross-platform backdoors (Windows, Linux, macOS, Android). 📦 Supports .exe, .apk, .docm formats, AutoRun USB/CD, payload pumping, and auto-listener setup—many payloads evade AV. 🔗…

HackGitToolkit's tweet image. 🚀 TheFatRat — An easy-to-use exploit tool integrating MSFvenom & Metasploit to generate cross-platform backdoors (Windows, Linux, macOS, Android).
📦 Supports .exe, .apk, .docm formats, AutoRun USB/CD, payload pumping, and auto-listener setup—many payloads evade AV.
🔗…

🛡️ EnumEDR‑s — Lightweight C tool to enumerate active EDRs on Windows 🔍 Scans processes & drivers to detect Microsoft Defender (AV/EPP), Elastic EDR, Sysmon, and more ⚙️ Easily extendable via EDRs.c Perfect for red team reconnaissance or blue team detection validation 🔗…

HackGitToolkit's tweet image. 🛡️ EnumEDR‑s — Lightweight C tool to enumerate active EDRs on Windows
🔍 Scans processes & drivers to detect Microsoft Defender (AV/EPP), Elastic EDR, Sysmon, and more
⚙️ Easily extendable via EDRs.c
Perfect for red team reconnaissance or blue team detection validation
🔗…

🚀 CobaltStrikeBeaconCppSource is an open-source C++ reimplementation of Cobalt Strike’s Beacon—built from scratch (not decompiled). Perfect for red teamers to study Beacon behavior, build custom loaders, or explore protocol logic. 🔗 github.com/kyxiaxiang/Cob… #CobaltStrike

github.com

GitHub - kyxiaxiang/CobaltStrikeBeaconCppSource: Out-of-the-box CobaltStrike Beacon source code use...

Out-of-the-box CobaltStrike Beacon source code use C++ - kyxiaxiang/CobaltStrikeBeaconCppSource


🚨 CVE‑2025‑47227 — Critical unauthenticated admin password reset bypass in Netmake ScriptCase (≤ v9.12.006) 🔐 RESET admin creds via crafted GET+POST to login.php 🎯 Chainable with CVE‑2025‑47228 for full RCE 🔧 PoC repo: github.com/B1ack4sh/Black… #CVE202547227 #ScriptCase #RCE


🚀 Meet TorGuard tgv2ray — a Sing‑Box-powered LuCI app for OpenWRT 🧩 Supports VLESS / VMess / Trojan / Shadowsocks via TorGuard subscription or custom config 🌐 Dual proxy (SOCKS5/HTTP) + VPN mode with TUN interface 📱 Full Web UI + UCI integration 🔗 github.com/torguardvpn/tg…

HackGitToolkit's tweet image. 🚀 Meet TorGuard tgv2ray — a Sing‑Box-powered LuCI app for OpenWRT
🧩 Supports VLESS / VMess / Trojan / Shadowsocks via TorGuard subscription or custom config
🌐 Dual proxy (SOCKS5/HTTP) + VPN mode with TUN interface
📱 Full Web UI + UCI integration
🔗 github.com/torguardvpn/tg……

🚨 CVE‑2025‑30406 — Critical deserialization flaw in Gladinet CentreStack & Triofox 🔐 Hardcoded machineKey allows attackers to forge ViewState and trigger RCE 🌍 Actively exploited in the wild since Mar 2025; CVSS: ~9.8 ⚠️ Patch to CentreStack v16.4.10315.56368 or rotate…


HackTools a reposté

This is why you don't share just everything on the web. The vid you see here must be one of the most effective AI awareness videos.


🚨 CVE‑2025‑8220 — SQL Injection in Engeman Web password recovery page (LanguageCombobox)! 🔐 Unauthenticated attacker can inject SQL remotely 📂 Affects Engeman Web ≤ 12.0.0.1; vendor non-responsive 🧪 PoC repo: github.com/m3m0o/engeman-… #SQLi #CVE20258220 #WebSecurity #PoC


☁️🔥 New from @carlospolop — cloudPeaSS is a powerful post-exploitation tool for cloud red teams. 🚀 Supports: •Azure & AWS privilege escalation enumeration •Role misconfig checks •Detection of over-permissive policies •Identity abuse scenarios 🔗 github.com/carlospolop/cl…

HackGitToolkit's tweet image. ☁️🔥 New from @carlospolop — cloudPeaSS is a powerful post-exploitation tool for cloud red teams.

🚀 Supports:
•Azure & AWS privilege escalation enumeration
•Role misconfig checks
•Detection of over-permissive policies
•Identity abuse scenarios

🔗 github.com/carlospolop/cl……

United States Tendances

Loading...

Something went wrong.


Something went wrong.