Keyhacks – A Repository Which Shows Quick Ways In Which API Keys Leaked By A Bug Bounty Program Can Be Checked To See If They’Re Valid
KeyHacks shows ways in which particular API keys found on a Bug Bounty Program can be used, to check if...
KeyHacks shows ways in which particular API keys found on a Bug Bounty Program can be used, to check if...
Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions...
Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview...
Read the blog posts here: https://iwantmore.pizza/posts/PEzor.html https://iwantmore.pizza/posts/PEzor2.html https://iwantmore.pizza/posts/PEzor3.html https://iwantmore.pizza/posts/PEzor4.html InstallationThe install.sh is designed to work on a Kali Linux distro....
M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform...
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It...
gargantuan hashcat rulesets generated from compromised passwords Project maintenance warning: This project is deemed completed. No pull requests or changes...
A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was...
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active...
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each...
Perform Google Dork search with Dorkify Google DorkingGoogle dorking is a hacker technique that uses Google Search to find security...
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing...
PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft...
Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It...
Go scripts for finding an API key / some keywords in repository Update V1.0.1Removing some checkers Adding example file contains...
Create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool tools...
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware...
keimpx is an open source tool, released under the Apache License 2.0. It can be used to quickly check for...
SQLancer (Synthesized Query Lancer) is a tool to automatically test Database Management Systems (DBMS) in order to find logic bugs...
XLMMacroDeobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM...
An educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Brutus: an IntroductionLooking for version...
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being...
Search for public profile information on FacebookInstallation# clone the repo$ git clone https://github.com/Godofcoffe/FisherMan# change the working directory to FisherMan$ cd...
REW-sploitThe tool has been presented at Black-Hat Arsenal USA 2021 https://www.blackhat.com/us-21/arsenal/schedule/index.html#rew-sploit-dissecting-metasploit-attacks-24086 Slides of presentation are available at https://github.com/REW-sploit/REW-sploit_docs Need help...