In the Open
Crypto
Enumeration
Containers
Docs
Network_scanners
Windows
Exfiltration
Exploit
CPUs
Binaries
Dns
Hashes
Imagemagick
Java
Level3_hypervisor
Linux
MacOS
Network
Padding
Python
Samba
Sqli
Ssl_tls
Web
Windows
Dll_hijacking
Docs
Macros
Payloads
Print_nightmare
Process_injection
Service_escalation
Zero_logon
Yaml
Forensics
Hashes
Misc
Osint
Persistence
Post exploitation
Seatbelt
Bc_security
Docs
- pivoting
Priv_esc
Docs
Kernel-exploits
Privesc-scripts
Suid
Reverse engineering
Reverse shells
Stego
Kroll Artifact Parser
- Collect and processes artifacts on windows
- Collects from live systems, mounted images and F-response tool
Targets
- Needs source and target directory, as well as a module to process the files on
Target copies a file into a repository
*.tkape files contains metadata of the files to copy
Compound Targets contain metadata of multiple files in order to get a result quicker
!Disable do not appear in the target list
!Local keep on local
Modules
- Used on the targeted files
*.mkape files
- Additional binaries are kept in
bin
Social_engineering