SCREEN_KILLER - Tool To Track Progress For Reporting (Capture Screenshot,...
This script was to developed to capturescreenshot during pentest engagment and OSCP.IMPORTANT: The screenshot feature is no longer allowed for exam but the terminal logging is allowed for exam.If you...
View ArticleKube-Score - Kubernetes Object Analysis With Recommendations For Improved...
kube-score is a tool that performs static code analysis of your Kubernetes object definitions.The output is a list of recommendations of what you can improve to make your application more secure and...
View ArticleIoTMap - Research Project On Heterogeneous IoT Protocols Modelling
IoTMap is a tool that models IoT networks using one or multiple protocols simultaneously. This is work in progress, as a part of a PhD thesis on Internet Of Things security. This repository is...
View ArticleLockphish - The First Tool For Phishing Attacks On The Lock Screen, Designed...
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.LockPhish Tutorial:...
View ArticleOffering Users More For Their Activity - Similar Items Upon Checkout
The shopping isn't finished once you've purchased your item. If you've ever done shopping online, then you know all about being presented with related items to the one you just purchased. This feature...
View ArticleGHunt - Investigate Google Accounts With Emai
GHunt is an OSINT tool to extract a lot of informations of someone's Google Account email.It can currently extract :Owner's nameLast time the profile was editedGoogle IDIf the account is an Hangouts...
View ArticleCSRFER - Tool To Generate CSRF Payloads Based On Vulnerable Requests
CSRFER is a tool to generate csrf payloads, based on vulnerable requests.It parses supplied requests to generate either a form or a fetch request. The payload can then be embedded in an html...
View ArticlevPrioritizer - Tool To Understand The Contextualized Risk (vPRisk) On...
As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry and it’s safe to assume that count is going to increase furthermore. It’s...
View ArticleC41N - An Automated Rogue Access Point Setup Tool
c41n is an automated Rogue Access Point setup tool.c41n provides automated setup of several types of Rogue Access Points, and Evil Twin attacks. c41n sets up an access point with user defined...
View ArticleSwiftBelt - A macOS Enumeration Tool Inspired By Harmjoy'S Windows-based...
SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities and instead uses Swift code (leveraging the Cocoa...
View ArticleNashaVM - A Virtual Machine For .NET Files And Its Runtime Was Made In C++/CLI
Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLIInstallationgit clone https://github.com/Mrakovic-ORG/NashaVM --recursecd NashaVM\NashaVMnuget...
View ArticleGitjacker - Leak Git Repositories From Misconfigured Websites
Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage to recover a significant portion of a repository...
View ArticleWave-Share - Serverless, Peer-To-Peer, Local File Sharing Through Sound
A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser.Nearby devices negotiate the WebRTC connection by exchanging the...
View ArticleO365Enum - Enumerate Valid Usernames From Office 365 Using ActiveSync,...
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover, or office.com login page.Usageo365enum will read usernames from the file provided as first parameter. The file should have one...
View ArticleDamnVulnerableCryptoApp - An App With Really Insecure Crypto
Why?If you try to learn a little bit more about crypto, either because you want to know how the attacks work or just because you want to do safe code, you end up diving really fast into the math behind...
View ArticleNuubi Tools - Information Ghatering, Scanner And Recon
Nuubi Tools: Information-ghatering|Scanner|ReconOptions: -h/--help | Show help message and exitArguments: -b/--banner | Banner grabing of target ip address -s/--subnet | Subnetlookup of target -c/--cms...
View ArticleMEDUZA - A More Or Less Universal SSL Unpinning Tool For iOS
"MEDUZA" ("медуза") means "jellyfish" in UkrainianWhat is MEDUZA?It's a Frida-based tool, my replacement for SSLKillSwitch. I created it for in-house use, but then decided to opensource it. TBH, I hate...
View ArticleMikrot8Over - Fast Exploitation Tool For Mikrotik RouterOS
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4This is reworked original Mikrotik Exploit. Added Python 2 compatibility and multithreading scan features.Python versionUtility was...
View ArticleZracker - Zip File Password BruteForcing Utility Tool based on CPU-Power
Zracker is a Zip File Password BruteForcing Utility Tool based on CPU-Power.Yet available for Linux only ...Supports WordList Mode only but will surely get an Update with BruteForce ModeDedicated...
View ArticleMail-Swipe - Script To Create Temporary Email Addresses And Receive Emails
Mail Swipe is a python script that helps you to create temporary email addresses and receive emails at that address. It uses the API provided by 1secmail to create emails addresses and fetch emails.You...
View Article