R K

Erlik : Vulnerable Soap Service

Erlik is a vulnerable SOAP web service. It is a lab environment created for people who want to improve themselves…

2 years ago

Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS

Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A…

2 years ago

Awesome-Password-Cracking :A Curated List Of Awesome Tools, Research, Papers And Other Projects

Awesome-Password-Cracking is a curated list of awesome tools, research, papers and other projects related to password cracking and password security.…

2 years ago

Autodeauth : A Tool Built To Automatically Deauth Local Networks

Autodeauth is a tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $…

2 years ago

Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator

Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of…

2 years ago

Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The…

2 years ago

ReconPal : Leveraging NLP For Infosec

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to…

2 years ago

System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware

System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to…

2 years ago

dBmonster : Track WiFi Devices With Their Recieved Signal Strength

dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their…

2 years ago

Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques

Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here…

2 years ago