R K

Epagneul : Graph Visualization For Windows Event Logs

Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…

3 years ago

S1EM : This Project Is A SIEM With SIRP And Threat Intel, All In One

S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…

3 years ago

Mip22 : An Advanced Phishing Tool

Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of…

3 years ago

PurplePanda : Identify Privilege Escalation Paths Within And Across Different Clouds

PurplePanda is a tool that fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths…

3 years ago

RefleXXion : A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV/EPP/EDR Etc

RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the…

3 years ago

WMEye : A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement

WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral…

3 years ago

Lnkbomb : Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares

Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for…

3 years ago

Patching : An Interactive Binary Patching Plugin For IDA Pro

Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering,…

3 years ago

Code Analysis : Static Code Analysis

Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis…

3 years ago

GoodHound : Uses Sharphound, Bloodhound And Neo4j To Produce An Actionable List Of Attack Paths

GoodHound came about because I had a need to perform a repeatable assessment of attack paths using Bloodhound.I found that…

3 years ago