R K

LinPwn : Interactive Post Exploitation Tool

LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation. Connection Set your IP…

6 years ago

Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable…

6 years ago

XORpass : Encoder To Bypass WAF Filters Using XOR Operations

XORpass is an encoder to bypass WAF filters using XOR operations. Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $…

6 years ago

CloudUnflare : Reconnaissance Real IP Address for Cloudflare Bypass

CloudUnflare is a tool used to reconnaissance Real IP address for Cloudflare Bypass. Preparation: 1. CompleteDNS API Create an account…

6 years ago

Cryptovenom : The Cryptography Swiss Army Knife

CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms,…

6 years ago

AutoSploit : Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through…

6 years ago

ATTACKdatamap : A Datasource Assessment On An Event Level To Show Potential Coverage

ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the "MITRE ATT&CK" framework. This tool…

6 years ago

JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

A ready to use JSONP endpoints to help bypass content security policy of different websites. The tool was presented during…

6 years ago

Arjun : HTTP Parameter Discovery Suite

Arjun is a web applications use parameters (or queries) to accept user input, take the following example into consideration. http://api.example.com/v1/userinfo?id=751634589…

6 years ago

HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day…

6 years ago