FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for …

FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for …
Cloud Exploit Framework Usage python3 tc.py -h_______ _ _ _____ _ _|__ __| | | | / ____| | | …
Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …
KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a …
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. – Installation & Requirements: Installing Jeeves OR $ git …
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
Monitor the Internet’s background noise Melody is a transparent internet sensor built for threat intelligence and supported by a detection …
To run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example: docker run -it -d …
WebApp intentionally made vulnerable to Race Condition Description Race Condition vulnerability can be practiced in the developed WebApp. Task is …