R K

Dorkify : Perform Google Dork Search

Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in…

3 years ago

SLSA : Supply-chain Levels For Software Artifacts

SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels…

3 years ago

PSPKIAudit : PowerShell toolkit for auditing Active Directory Certificate Services (AD CS)

PSPKIAudit is a PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft…

3 years ago

EDD : Enumerate Domain Data

EDD (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the…

3 years ago

Git-Secret : Go Scripts For Finding An API Key / Some Keywords In Repository

Git-Secret is a go scripts for finding an API key / some keywords in repository. Update V1.0.1 Removing some checkersAdding…

3 years ago

LazySign – Create Fake Certs For Binaries Using Windows Binaries And The Power Of Bat Files

LazySign create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool…

3 years ago

Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture

Brutus is an educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Introduction Looking for…

3 years ago

PickleC2 : A Post-Exploitation And Lateral Movements Framework

PickleC2 is a simple C2 framework written in python3 used to help the community in Penetration Testers in their red…

3 years ago

TsharkVM : Tshark + ELK Analytics Virtual Machine

tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual…

3 years ago

Process-Dump : Windows Tool For Dumping Malware PE Files From Memory Back To Disk For Analysis

Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware…

3 years ago