R K

Metame : Metamorphic Code Engine For Arbitrary Executables

Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically…

6 years ago

GitGraber : Monitor GitHub To Search & Find Sensitive Data

GitGraber is a tool developed in Python3 to monitor GitHub to search and find sensitive data in real time for…

6 years ago

FileGPS : A Tool That Help You To Guess How Your Shell Was Renamed

FileGPS is a tool that uses various techniques to find the new filename, after the server-side script renamed and saved…

6 years ago

ActiveReign : A Network Enumeration & Attack Toolset

ActiveReign is a network enumeration and attack toolset.A while back I was challenged to write a discovery tool with Python3…

6 years ago

Revshellgen : Reverse Shell Generator Written In Python

Revshellgen is a standalone python script for generating reverse shells easily and automating the boring stuff like URL encoding the…

6 years ago

LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN or Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual…

6 years ago

OpenCti : Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been…

6 years ago

BlackArch Linux – Penetration Testing Distribution

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336 tools. You can install tools…

6 years ago

Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial & Customized Assessment

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup…

6 years ago

PingCastle : Get Active Directory Security At 80% In 20% Of The Time

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment…

6 years ago