Tuesday, July 27, 2021
Home Tags Cook

Tag: Cook

Must Need

Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir is a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting.
Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability POC

Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability...

Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None AlgorithmRSAtoHMAC Refer to...
Wordlist-Generator : Unique Wordlist Generator Of Unique Wordlists

Wordlist-Generator : Unique Wordlist Generator Of Unique Wordlists

Wordlist-Generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from gau and...
SauronEye : Search Tool To Find Specific Files Containing Specific Words

SauronEye : Search Tool To Find Specific Files Containing Specific Words

SauronEye is a search tool built to aid red teams in finding files containing specific keywords. Features
ByeIntegrity UAC : Bypass UAC By Hijacking A DLL Located In The Native Image Cache

ByeIntegrity UAC : Bypass UAC By Hijacking A DLL Located In...

ByeIntegrity UAC is a tool used to bypass user account control (UAC) to gain elevated (Administrator) privileges to run any program at...
ProxyLogon : PoC Exploit for Microsoft Exchange

ProxyLogon : PoC Exploit for Microsoft Exchange

ProxyLogon is a tool for PoC exploit for Microsoft exchange. How to use? python...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...