AirStrike : Automatically Grab And Crack WPA-2 Handshakes With Distributed Client-Server Architecture

3 years ago

AirStrike is a tool that automates cracking of WPA-2 Wi-Fi credentials using client-server architecture. Requirements Airstrike uses Hashcat Brain Architecture, aircrack-ng suite, entr utility…

IAM Vulnerable : Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground

3 years ago

IAM Vulnerable is to use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.. IAM Vulnerable uses the…

IDA2Obj : Static Binary Instrumentation

3 years ago

IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly from one executable binary.Link the object files into…

DLLHijackingScanner : This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The “Trusted Directories” Verification

3 years ago

DLLHijackingScanner is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification. Generate Header from CSV The python script CsvToHeader.py can be…

ClusterFuzzLite : Simple Continuous Fuzzing That Runs In CI

3 years ago

ClusterFuzzLite is a continuous fuzzing solution that runs as part of Continuous Integration (CI) workflows to find vulnerabilities faster than ever before. With just…

Crawpy : Yet Another Content Discovery Tool

3 years ago

Crawpy is Yet another content discovery tool written in python. What makes this tool different than others: It is written…

Kerberoast : Kerberoast Attack -Pure Python-

3 years ago

Kerberoast attack toolkit -pure python Install pip3 install kerberoast Prerequirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted…

ShonyDanza : A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan

3 years ago

ShonyDanza is a customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you…

XC : A Small Reverse Shell For Linux And Windows

3 years ago

XC is a Netcat like reverse shell for Linux & Windows. Features Windows Usage:└ Shared Commands: !exit!upload uploads a file…

ZipExec : A Unique Technique To Execute Binaries From A Password Protected Zip

3 years ago

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then…