R K

Ppmap : A Scanner/Exploitation Tool Written In GO, Which Leverages Prototype Pollution To XSS By Exploiting Known Gadgets

Ppmap is a simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables…

3 years ago

MANSPIDER : Spider Entire Networks For Juicy Files Sitting On SMB Shares. Search Filenames Or File Content – Regex Supported!

MANSPIDER will crawl every share on every target system. If provided creds don't work, it will fall back to "guest",…

3 years ago

Terra guard : Create And Destroy Your Own VPN Service Using Wire Guard

Terra guard's goal is to be simple to create and destroy your own VPN service using Wire Guard. Prerequisites Terraform >=…

3 years ago

Pathprober : Probe And Discover HTTP Pathname Using Brute-Force Methodology And Filtered By Specific Word Or 2 Words At Once

Pathprober is a Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at…

3 years ago

In0ri : Defacement Detection With Deep Learning

In0ri is a defacement detection system utilizing a image-classification convolutional neural network. Introduction When monitoring a website, In0ri will periodically…

3 years ago

TeamsUserEnum : User Enumeration With Microsoft Teams API

TeamsUserEnum, sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an…

3 years ago

PSTF2 : Passive Security Tools Fingerprinting Framework

PSTF2 is a Passive Security Tools Fingerprinting Framework. Have you ever wanted a simple, easy and stealth bypass for multiple…

3 years ago

Beanshooter : JMX Enumeration And Attacking Tool

Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints. Introduction JMX stands for Java Management Extensions and can…

3 years ago

Hash-Buster v3.0 : Crack Hashes In Seconds

Hash-Buster v3.0 is a tool to Crack Hashes In Seconds. Features Automatic hash type identificationSupports MD5, SHA1, SHA256, SHA384, SHA512Can…

3 years ago

Allsafe : Intentionally Vulnerable Android Application

Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like…

3 years ago