PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects …
KRBUACBypass – UAC Bypass By Abusing Kerberos Tickets
This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level …
TelegramRAT – Cross Platform Telegram Based RAT That Communicates Via Telegram To Evade Network Restrictions
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions 1. git clone https://github.com/machine1337/TelegramRAT.git2. Now Follow the …
LFI-FINDER – Tool Focuses On Detecting Local File Inclusion (LFI) Vulnerabilities
Written by TMRSWRR Version 1.0.0 Instagram: TMRSWRR How to use LFI-FINDER is an open-source tool available on GitHub that focuses …
Artemis – APK Infrastructure Investigator
Overview A tools for Find APK Infrastructure . HADESS performs offensive cybersecurity services through infrastructures and software that include vulnerability …
pyFUD – Multi Clients FUD Reverse Shell
python3 based multi clients reverse shell. 1. Don’t Upload Any Payloads To VirusTotal.com Bcz This tool will not workwith Time.2. …
Mapsdumper – Dump Place Details From Google Maps Like Phone, Email, Website, And Reviews
Demo • Installation • Feature • Credits A tool for dumping place details from Google Maps such as phone numbers, …
Bashfuscator – A Fully Configurable And Extendable Bash Obfuscation Framework
Documentation What is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous …
Wallet-Transaction-Monitor – This Script Monitors A Bitcoin Wallet Address And Notifies The User When There Are Changes In The Balance Or New Transactions
This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new …
CakeFuzzer – Automatically And Continuously Discover Vulnerabilities In Web Applications Created Based On Specific Frameworks
Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …