R K

IAM Vulnerable : Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground

IAM Vulnerable is to use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.. IAM Vulnerable uses the…

3 years ago

IDA2Obj : Static Binary Instrumentation

IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly from one executable binary.Link the object files into…

3 years ago

DLLHijackingScanner : This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The “Trusted Directories” Verification

DLLHijackingScanner is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification. Generate Header from CSV The python script CsvToHeader.py can be…

3 years ago

ClusterFuzzLite : Simple Continuous Fuzzing That Runs In CI

ClusterFuzzLite is a continuous fuzzing solution that runs as part of Continuous Integration (CI) workflows to find vulnerabilities faster than ever before. With just…

3 years ago

Crawpy : Yet Another Content Discovery Tool

Crawpy is Yet another content discovery tool written in python. What makes this tool different than others: It is written…

3 years ago

Kerberoast : Kerberoast Attack -Pure Python-

Kerberoast attack toolkit -pure python Install pip3 install kerberoast Prerequirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted…

3 years ago

ShonyDanza : A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan

ShonyDanza is a customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you…

3 years ago

XC : A Small Reverse Shell For Linux And Windows

XC is a Netcat like reverse shell for Linux & Windows. Features Windows Usage:└ Shared Commands: !exit!upload uploads a file…

3 years ago

ZipExec : A Unique Technique To Execute Binaries From A Password Protected Zip

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then…

3 years ago

Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated And Semi-Dedicated Hosting

Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing…

3 years ago