R K

AV|Ator : Generator Utility To Bypass AV Detection

AV|Ator is a backdoor generator utility, which uses cryptographic and injection techniques in order to bypass AV detection. More specifically:…

3 years ago

Fuzzable : Framework for Automating Fuzzable Target Discovery with Static Analysis

Fuzzable is a Framework for Automating Fuzzable Target Discovery with Static Analysis. Vulnerability researchers conducting security assessments on software will…

3 years ago

TerraLdr : A Payload Loader Designed With Advanced Evasion Features

TerraLdr is a Payload Loader Designed With Advanced Evasion Features. Details no crt functions imported syscall unhooking using KnownDllUnhook api…

3 years ago

YATAS : A Simple Tool To Audit Your AWS Infrastructure For Misconfiguration

The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won't check…

3 years ago

AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion

AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect.…

3 years ago

REST-Attacker : A Proof-Of-Concept For The Feasibility Of Testing

REST-Attacker is an automated penetration testing framework for APIs following the REST architecture style. The tool's focus is on streamlining…

3 years ago

DotDumper : An Automatic Unpacker & Logger For DotNet Framework

DotDumper is a automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat…

3 years ago

ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

ExchangeFinder is a simple and open-source tool that tries to find Micrsoft Exchange instance for a given domain based on…

3 years ago

Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other…

3 years ago

PXEThief : Extract Passwords From The Operating System Deployment Functionality

PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out…

3 years ago