R K

Whispers : Identify Hardcoded Secrets In Static Structured Text

Whispers is a static code analysis tool designed for parsing various common data formats in search of hardcoded credentials and…

3 years ago

UDP-Hunter : Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols

UDP-Hunter is a UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top…

3 years ago

ThreatBox : A Standard And Controlled Linux Based Attack Platform

ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started…

3 years ago

ThreadBoat : Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application

ThreadBoat is a Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. About I developed this…

3 years ago

Stacs : Static Token And Credential Scanner

Stacs is a YARA powered static credential scanner which supports binary file formats, analysis of nested archives, composable rulesets and ignore lists,…

3 years ago

SillyRAT : A Cross Platform Multifunctional (Windows/Linux/Mac) RAT

SillyRAT is a cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as…

3 years ago

Registry-Recon : Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon

Registry-Recon is a Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon. Description As a red-team practitioner, we are often using…

3 years ago

pwnSpoof : Generates realistic spoofed log files for common web servers with customisable attack scenarios

pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customizable attack scenarios. Every log bundle is…

3 years ago

Nosferatu : Lsass NTLM Authentication Backdoor

Nosferatu is a Lsass NTLM Authentication Backdoor How It Works First, the DLL is injected into the lsass.exe process, and will begin…

3 years ago

Kubernetes-Goat : Is A “Vulnerable By Design” Kubernetes Cluster

Kubernetes-Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security. Setting Up Kubernetes Goat…

3 years ago