R K

HRShell : HTTPS/HTTP Reverse Shell Built With Flask

HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.…

6 years ago

Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien tool launches attack on k8s cluster from within. That means you already need to have an access with permission…

6 years ago

Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation Tasks

Flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use…

6 years ago

MemProcFS : The Memory Process File System

MemProcFS the Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual…

6 years ago

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and…

6 years ago

Rebel Framework : Penetration Testing Framework

Rebel framework is an advanced and easy to use penetration testing framework. Start git clone https://github.com/rebellionil/rebel-framework.git cd rebel-framework bash setup.sh…

6 years ago

Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For Security Vulnerabilities

Firmware analysis toolkit is a toolkit to emulate firmware and analyse it for security vulnerabilities. FAT is a toolkit built…

6 years ago

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application…

6 years ago

SKA : Simple Karma Attack

SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the…

6 years ago

ArmourBird CSF – Container Security Framework

ArmourBird CSF - Container Security Framework is an extensible, modular, API-first framework build for regular security monitoring of docker installations and…

6 years ago