Highlights
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic SQL injection and database takeover tool
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Scanning APK file for URIs, endpoints & secrets.
A collection of custom security tools for quick needs.
Tool for Active Directory Certificate Services enumeration and abuse
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.