R K

VAST : Visibility Across Space And Time

VAST is a tool for the network telemetry engine for data-driven security investigations. Key Features High-Throughput Ingestion: import numerous log…

4 years ago

Baserunner : A Tool For Exploring Firebase Datastores

Baserunner is atool for exploring and exploiting Firebase datastores. See this post on our blog for an overview of how Firebase works…

4 years ago

LibAFL : Advanced Fuzzing Library – Slot Your Fuzzer Together In Rust

Advanced Fuzzing Library is a slot your own fuzzers together and extend their features using Rust. LibAFL is written and…

4 years ago

WordPress Brute Force : Super Fast Login WordPress Brute Force

WordPress Brute Force is a super fast login for WordPress. .---. .-----------/ \ __ / ------/ / ( )/ -----//////…

4 years ago

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin idea is to "translate" Windows OS privileges to a path leading to: administrator,integrity and/or confidentiality threat,availability threat,just a mess.…

4 years ago

Kiterunner : Contextual Content Discovery Tool

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective…

4 years ago

Red-Detector : Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io

Red-Detector is a tool to Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance…

4 years ago

Evasor : A Tool To Be Used In Post Exploitation Phase For Blue

The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be…

4 years ago

CANalyse : A Vehicle Network Analysis And Attack Tool

CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect…

4 years ago

Judge Jury And Executable : A File System Forensics Analysis Scanner & Threat Hunting Tool

Judge Jury And Executable is a File System Forensics Analysis Scanner And Threat Hunting Tool Features Scan a mounted filesystem…

4 years ago