ThreadBoat – Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application

Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. About I developed this small project to continue my experiences of different code injection methods and to allow RedTeam security professionals to utilize this method as a unique way to perform software penetration testing. With Thread hijacking, it allows the hijacker.exe programRead More

Keyhacks – A Repository Which Shows Quick Ways In Which API Keys Leaked By A Bug Bounty Program Can Be Checked To See If They’Re Valid

KeyHacks shows ways in which particular API keys found on a Bug Bounty Program can be used, to check if they are valid. @Gwen001 has scripted the entire process available here and it can be found here Table of Contents ABTasty API Key Algolia API key Amplitude API Keys Asana Access token AWS Access KeyRead More

FisherMan – CLI Program That Collects Information From Facebook User Profiles Via Selenium

Search for public profile information on Facebook Installation # clone the repo$ git clone change the working directory to FisherMan$ cd FisherMan# install the requirements$ python3 -m pip install -r requirements.txt Pre-requisites Make sure you have the executable “geckodriver” installed on your machine. Usage facebook profiles. (Version 3.4.0) optional arguments: -h, –help show thisRead More

Rtl_433 – Program To Decode Radio Transmissions From Devices On The ISM Bands (And Other Frequencies)

rtl_433 (despite the name) is a generic data receiver, mainly for the 433.92 MHz, 868 MHz (SRD), 315 MHz, 345 MHz, and 915 MHz ISM bands. The official source code is in the repository. For more documentation and related projects see the site. It works with RTL-SDR and/or SoapySDR. Actively tested and supportedRead More

Rconn – Rconn Is A Multiplatform Program For Creating Generic Reverse Connections

rconn (r[everse] conn[ection]) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT and/or firewall without adding firewall rules or port-forwarding. This is achieved by creating a connection from the node behind the firewall/NAT to a port on your local machine, and then a port is exposed inRead More

Obfuscator – The Program Is Designed To Obfuscate The Shellcode

The program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption. 1) XOR2) AES The tool accepts shellcode in 4 formats. 1) base642) hex3) c4) raw Command Line Usage Usage Description—– ———–/f Specify the format of the shellcode base64 hex c raw/enc Specify the encryption type (aes or xor) in which theRead More

mapCIDR – Small Utility Program To Perform Multiple Operations For A Given subnet/CIDR Ranges

Small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed to ease load distribution for mass scanning operations, it can be used both as a library and as independent CLI tool. Features Simple and modular code base making it easy to contribute. CIDR distribution for distributed scanning. Stdin andRead More