This is a tool I whipped up together quickly to DCSync utilizing ESC1. It is quite slow but otherwise an …


This is a tool I whipped up together quickly to DCSync utilizing ESC1. It is quite slow but otherwise an …
Caracal is a static analyzer tool over the SIERRA representation for Starknet smart contracts. Features Detectors to detect vulnerable Cairo …
Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate …
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration …
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects …
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for …
Cloud Exploit Framework Usage python3 tc.py -h_______ _ _ _____ _ _|__ __| | | | / ____| | | …
Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …
KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a …
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. – Installation & Requirements: Installing Jeeves OR $ git …