R K

Lazyrecon : Automate Your Reconnaissance Process In An Organized Fashion

LazyRecon is a script written in Bash, it is intended to automate some tedious tasks of reconnaissance and information gathering.…

6 years ago

Path Auditor : Detecting Unsafe Path Access Patterns

The Path Auditor is a tool meant to find file access related vulnerabilities by auditing libc functions. Path Auditor idea…

6 years ago

Automatic API Attack Tool 2019

Automatic API Attack Tool is a imperva's customizable API attack tool takes an API specification as an input, generates and…

6 years ago

Silver : Mass Scan IPs For Vulnerable Services

masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows…

6 years ago

Secretx : Extracting API keys & Secrets By Requesting Each URL At The Your List

Secretx is a tool which is mainly used for extracting api keys and secrets by requesting each url at the…

6 years ago

ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch,…

6 years ago

NodeCrypto : Linux Ransomware Written In NodeJs

NodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you…

6 years ago

PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

PBTK is a tool that can be used for reverse engineering and fuzzing protobuf based application. Protobuf is a serialization…

6 years ago

theTHE : The Threat Hunting Environment

You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…

6 years ago

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…

6 years ago