Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate …

Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate …
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration …
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects …
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for …
Cloud Exploit Framework Usage python3 tc.py -h_______ _ _ _____ _ _|__ __| | | | / ____| | | …
Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …
KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a …
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. – Installation & Requirements: Installing Jeeves OR $ git …
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …