WAF-A-MoLE : A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls

4 years ago

WAF-A-MoLE is a guided mutation-based fuzzer for ML-based Web Application Firewalls, inspired by AFL and based on the FuzzingBook by Andreas Zeller et al.…

AWS Pen-Testing Laboratory : Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet

4 years ago

AWS Pen-Testing Laboratory deployed as IaC with Terraform on AWS. It deploys a Kali Linux instance accessible via ssh &…

Heappy : A Happy Heap Editor To Support Your Exploitation Process

4 years ago

Heappy is an editor based on gdb/gef that helps you to handle the heap during your exploitation development.The project should…

Fully-Homomorphic-Encryption : Libraries And Tools To Perform Fully Homomorphic Encryption Operations On An Encrypted Data Set

4 years ago

Fully-Homomorphic-Encryption, this repository contains open-source libraries and tools to perform fully homomorphic encryption (FHE) operations on an encrypted data set.…

RomBuster : A Router Exploitation Tool That Allows To Disclosure Network Router Admin Password

4 years ago

RomBuster is a router exploitation tool that allows to disclosure network router admin password. Features Exploits vulnerabilities in most popular…

CamOver : A Camera Exploitation Tool That Allows To Disclosure Network Camera Admin Password

4 years ago

CamOver is a camera exploitation tool that allows to disclosure network camera admin password. Features Exploits vulnerabilities in most popular…

Shreder : A Powerful Multi-Threaded SSH Protocol Password Bruteforce Tool

4 years ago

Shreder is a powerful multi-threaded SSH protocol password brute-force tool. Features Very fast password guessing, just one password in 0.1 second.Optimized for…

BlobHunter : Find Exposed Data In Azure With This Public Blob Scanner

4 years ago

BlobHunter is an opensource tool for scanning Azure blob storage accounts for publicly opened blobs.BlobHunter is a part of "Hunting…

SharpHook : Tool Tath Uses Various API Hooks In Order To Give Us The Desired Credentials

4 years ago

SharpHook is inspired by the SharpRDPThief project, It uses various API hooks in order to give us the desired credentials. In…

CamRaptor : Tool That Exploits Several Vulnerabilities In Popular DVR Cameras To Obtain Network Camera Credentials

4 years ago

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials. Features Exploits vulnerabilities…