DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology
A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and comfortable. Now with public test relay servers!
What Is This...
SkyScalpel : The Art Of Cloud Policy Obfuscation And Detection
SkyScalpel is an open-source framework for JSON policy parsing, obfuscation, deobfuscation, and detection in cloud environments.
It provides flexible and highly configurable mechanisms to...
RevC2 : Websocket Setup Secure Testing Guide
This Python script emulates the websocket server side of RevC2 by sending the type you select and rendering the response. Please make sure you...
Genzai : The Ultimate IoT Security Toolkit – Setup, Features, And Usage
The tool is written in Go, so make sure to install it on your system before proceeding. The setup is pretty easy and straight...
DICOMHawk – A Honeypot For Secure DICOM Server Monitoring
DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.
Built using Flask and...
ShadowDumper – Advanced Techniques For LSASS Memory Extraction
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service) memory, often needed in penetration testing and red teaming...
Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rust’s safety and performance features.
This project...
CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which allowed for a sandbox...
MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.
Its foundation is a 100% custom-built C# LDAP parser that handles tokenization and...
go-exploitdb : A Comprehensive Guide To Managing Exploit Databases
This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched by command line interface....