R K

PEzor-Docker : With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!

PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of…

3 years ago

Graphql-Threat-Matrix : GraphQL Threat Framework Used By Security Professionals

graphql-threat-matrix was built for bug bounty hunters, security researchers and hackers to assist with uncovering vulnerabilities across multiple GraphQL implementations. The…

3 years ago

Malicious-Pdf : Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality

Malicious-Pdf Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration testing and/or…

3 years ago

Cliam : Multi Cloud IAM Permissions Enumeration Tool

Cliam is a simple cloud permissions identifier. There are two main components to the CLI. Most of the enumerated permissions…

3 years ago

LDAPFragger : Command And Control Tool That Enables Attackers To Route Cobalt Strike Beacon Data

LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beacon data over LDAP using user…

3 years ago

FirmWire : b Full-System Baseband Firmware Emulation Platform

FirmWire is a full-system baseband firmware analysis platform that supports Samsung and MediaTek. It enables fuzzing, root-cause analysis, and debugging…

3 years ago

LeakedHandlesFinder : Leaked Windows Processes Handles Identification Tool

Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new…

3 years ago

Pybatfish : Python Client For Batfish (Network Configuration Analysis Tool)

Pybatfish is a Python client for Batfish. What is Batfish? Batfish is a network validation tool that provides correctness guarantees for…

3 years ago

Moonwalk : Cover Your Tracks During Linux Exploitation By Leaving Zero Traces

moonwalk is a 400 KB single-binary executable that can clear your traces while penetration testing a Unix machine. It saves the state of…

3 years ago

Nanodump : A Crappy LSASS Dumper With No ASCII Art

Nanodump, a flexible tool that creates a minidump of the LSASS process. Features It uses syscalls (with SysWhispers2) for most operations.Syscalls…

3 years ago