R K

WAF-A-MoLE : A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls

WAF-A-MoLE is a guided mutation-based fuzzer for ML-based Web Application Firewalls, inspired by AFL and based on the FuzzingBook by Andreas Zeller et al.…

3 years ago

AWS Pen-Testing Laboratory : Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet

AWS Pen-Testing Laboratory deployed as IaC with Terraform on AWS. It deploys a Kali Linux instance accessible via ssh &…

3 years ago

Heappy : A Happy Heap Editor To Support Your Exploitation Process

Heappy is an editor based on gdb/gef that helps you to handle the heap during your exploitation development.The project should…

3 years ago

Fully-Homomorphic-Encryption : Libraries And Tools To Perform Fully Homomorphic Encryption Operations On An Encrypted Data Set

Fully-Homomorphic-Encryption, this repository contains open-source libraries and tools to perform fully homomorphic encryption (FHE) operations on an encrypted data set.…

3 years ago

RomBuster : A Router Exploitation Tool That Allows To Disclosure Network Router Admin Password

RomBuster is a router exploitation tool that allows to disclosure network router admin password. Features Exploits vulnerabilities in most popular…

3 years ago

CamOver : A Camera Exploitation Tool That Allows To Disclosure Network Camera Admin Password

CamOver is a camera exploitation tool that allows to disclosure network camera admin password. Features Exploits vulnerabilities in most popular…

3 years ago

Shreder : A Powerful Multi-Threaded SSH Protocol Password Bruteforce Tool

Shreder is a powerful multi-threaded SSH protocol password brute-force tool. Features Very fast password guessing, just one password in 0.1 second.Optimized for…

3 years ago

BlobHunter : Find Exposed Data In Azure With This Public Blob Scanner

BlobHunter is an opensource tool for scanning Azure blob storage accounts for publicly opened blobs.BlobHunter is a part of "Hunting…

3 years ago

SharpHook : Tool Tath Uses Various API Hooks In Order To Give Us The Desired Credentials

SharpHook is inspired by the SharpRDPThief project, It uses various API hooks in order to give us the desired credentials. In…

3 years ago

CamRaptor : Tool That Exploits Several Vulnerabilities In Popular DVR Cameras To Obtain Network Camera Credentials

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials. Features Exploits vulnerabilities…

3 years ago