Wednesday, 13 February 2019

Gorsair - Penetration Testing tool for Docker

Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has ... thumbnail 1 summary
  • Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has ...

    Friday, 11 January 2019

    Hash Generator & Cracker Online Offline

    #Install Note Clone the repository: git clone https://github.com/0xR0/hediye.git #Then go inside: cd hediye/ #use examples: pyth... thumbnail 1 summary
  • #Install Note Clone the repository: git clone https://github.com/0xR0/hediye.git #Then go inside: cd hediye/ #use examples: pyth...

    Wednesday, 2 January 2019

    PHANTOM EVASION 2.0.1- An Antivirus Evasion Tool

    Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most... thumbnail 1 summary
  • Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most...

    Wednesday, 28 November 2018

    XSShell - A XSS Reverse Shell Framework

    XSShell is a cross-site-scripting reverse shell... Okay, well maybe it's not a true reverse shell, but it will allow you to interact in... thumbnail 1 summary
  • XSShell is a cross-site-scripting reverse shell... Okay, well maybe it's not a true reverse shell, but it will allow you to interact in...

    Monday, 26 November 2018

    Zstandard – Fast real-time compression algorithm

    Zstandard , or zstd as short version, is a fast lossless compression algorithm, targeting real-time compression scenarios at zlib-level a... thumbnail 1 summary
  • Zstandard , or zstd as short version, is a fast lossless compression algorithm, targeting real-time compression scenarios at zlib-level a...

    Saturday, 17 November 2018

    CloudBunny : Capture Real IP of Server behind WAF

    CloudBunny is a tool to capture the origin server that uses a WAF as a proxy or protection. This tool we used three search engines to s... thumbnail 1 summary
  • CloudBunny is a tool to capture the origin server that uses a WAF as a proxy or protection. This tool we used three search engines to s...

    Wednesday, 14 November 2018

    FakeImageExploiter - Use a Fake Image to Exploit Target

    This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it... thumbnail 1 summary
  • This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it...