R K

NimHollow : Nim Implementation Of Process Hollowing Using Syscalls (PoC)

NimHollow is a Nim Implementation Of Process Hollowing Using Syscalls (PoC). Playing around with the Process Hollowing technique using Nim. Features Direct…

3 years ago

Spamscanner : Spam Scanner Is The Best Anti-Spam, Email Filtering, And Phishing Prevention Service

Spamscanner is a tool and service built by @niftylettuce after hitting countless roadblocks with existing spam-detection solutions. In other words, it's our…

3 years ago

Spray365 : Makes Spraying Microsoft Accounts Through Two-Step Password Spraying Approach

Spray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is…

3 years ago

SQLbit : Just Another Script For Automatize Boolean-Based Blind SQL Injectionsv

SQLbit is just another script for automatize boolean-based blind SQL injections.Works with SQLite at least, supports using cookies.It uses bitwise…

3 years ago

Mesh-Kridik : An Open-Source Security Checker That Performs Security Checks On A Kubernetes Cluster

Mesh-Kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and…

3 years ago

Web Cache Vulnerability Scanner : A Go-based CLI Tool For Testing Web Cache Poisoning

Web Cache Vulnerability Scanner (WCVS) is a fast and versatile CLI scanner for web cache poisoning developed by Hackmanit. The scanner supports many…

3 years ago

MUI : A GUI Plugin For Binary Ninja To Interact And View The Progress Of Manticore

MUI (Manticore User Interface) project, we provide a graphical user interface plugin for Binary Ninja to allow users to easily interact with…

3 years ago

Umay : IoT Malware Similarity Analysis Platform

Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared…

3 years ago

MultiPotato : Another Potato to get SYSTEM via SeImpersonate privileges

MultiPotato is just another Potato to get SYSTEM via SeImpersonate privileges. But this one is different in terms of It…

3 years ago

TrojanSourceFinder : Help Find Trojan Source Vulnerability In Code

TrojanSourceFinder is a Trojan Source vulnerability allows an attacker to make malicious code appear innocent. In general, the attacker tries…

3 years ago