DNS Rebinding Tool : DNS Rebind Tool With Custom Scripts

5 years ago

This project is meant to be an All-in-one Toolkit to test further DNS rebinding attacks and my take on understanding these kind…

Fenrir : Simple Bash IOC Scanner

5 years ago

Fenrir is a simple IOC scanner bash script. It allows scanning Linux/Unix/OSX systems for the following Indicators of Compromise (IOCs):…

Manati : A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts

5 years ago

The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed…

ThreadBoat : Program Uses Thread Execution Hijacking to Inject Native Shellcode into a Standard Win32 Application

5 years ago

ThreadBoat program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. I developed this small project to…

SQLMap : Automatic SQL Injection & Database Takeover Tool

5 years ago

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and…

GiveMeSecrets : Use Regular Expressions To Get Sensitive Information

5 years ago

GiveMeSecrets use regular expressions to get sensitive information from a given repository (GitHub, pip or npm). You only need to…

Hardening Kubernetes Security with Falco: Runtime Threat Detection

5 years ago

Kubernetes has become a cornerstone of modern cloud-native applications, offering powerful orchestration capabilities for containerized applications. However, its complexity also…

Lockdoor Framework : A Penetration Testing Framework with Cyber Security Resources

5 years ago

LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux…

Sub.sh : Online Subdomain Detect Script

5 years ago

Sub.sh is a script to detect subdomain online. So let us have a look on it usage. Script bash sub.sh…

Cryptondie : A Ransomware Developed For Study Purposes

5 years ago

CryptonDie is a ransomware developed for study purposes. Options --key key used to encrypt and decrypt files, default is random…