-
Preemptive Cyber Security Pty Ltd
- Melbourne, Victoria, Australia
- viralmaniar.github.io
- @maniarviral
-
-
-
-
-
MurMurHash Public
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
-
-
-
Powershell-RAT Public
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using scree…
-
DDWPasteRecon Public
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation…
-
-
BigBountyRecon Public
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
-
-
Phirautee Public
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. …
-
HiveJack Public
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the a…
-
XposedOrNot Public
XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual acc…
-
-
PeekABoo Public
PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desk…
-
I-See-You Public
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary…
-
Passhunt Public
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
-
SMWYG-Show-Me-What-You-Got Public
This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilatio…
-
Remote-Desktop-Caching- Public
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or an…
-
Guided-Access-Mode-Bypass Public
This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.
-
-
In-Spectre-Meltdown Public
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows un…
-
Wifi-Dumper Public
This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This tool will help you in a Wifi penetration testing. Furthermo…
-
securedorg.github.io Public
Forked from zigzig122468/securedorg.github.io -
cmd.jsp Public
Forked from SecurityRiskAdvisors/cmd.jspA super small jsp webshell with file upload capabilities.
-
-
Reg-Hives Public
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYSTEM, SECURITY and SAM hives and download them back to the a…
-
security-onion Public
Forked from Security-Onion-Solutions/security-onionLinux distro for IDS, NSM, and Log Management