R K

RPCMon : RPC Monitor Tool Based On Event Tracing For Windows

RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like…

2 years ago

crAPI : Completely Ridiculous API

crAPI (completely ridiculous API) will help you to understand the ten most critical API security risks. crAPI is vulnerable by design, but…

2 years ago

dnsReaper : Subdomain Takeover Tool For Attackers, Bug Bounty Hunters And The Blue Team!

DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures…

2 years ago

Ropr : A Blazing Fast Multithreaded ROP Gadget Finder. Ropper / Ropgadget Alternative

ROP (Return Oriented Programming) Gadgets are small snippets of a few assembly instructions typically ending in a ret instruction which already exist…

2 years ago

Hoaxshell : An Unconventional Windows Reverse Shell, Currently Undetected By Microsoft Defender

Hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it is…

2 years ago

VLANPWN : VLAN Attacks Toolkit

VLAN attacks toolkit, the author has nothing to do with those who will use these tools for personal purposes to…

2 years ago

RedGuard : C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check

RedGuard, a derivative tool based on command and control (C2) front flow control technology, has a lighter design, efficient traffic…

2 years ago

NimGetSyscallStub : Get Fresh Syscalls From A Fresh Ntdll.Dll Copy

NimGetSyscallStub, Get fresh Syscalls from a fresh ntdll.dll copy. This code can be used as an alternative to the already…

2 years ago

Chisel-Strike : A .NET XOR Encrypted Cobalt Strike Aggressor Implementation For Chisel To Utilize Faster Proxy

Chisel-Strike is a .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.…

2 years ago

OffensiveVBA : Code Execution And AV Evasion Methods For Macros In Office Documents

OffensiveVBA, In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods…

2 years ago