-
Freelancer
- Hamedan, Iran
- https://zil.ink/zoghal
- @zoghal
Hacking
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
PrintNightmare (CVE-2021-34527) PoC Exploit
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including …
🔪 Scan memory for secrets and more. Maybe eventually a full /proc toolkit.
PowerShell Asynchronous TCP Reverse Shell
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, exi…
Various webshells. We accept pull requests for additions to this collection.
An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …
Self contained htaccess shells and attacks
Real fucking shellcode encryptor & obfuscator tool
GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
The Internets #1 Subdomain Takeover Tool
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
Kyanos is a networking analysis tool using eBPF. It can visualize the time packets spend in the kernel, capture requests/responses, makes troubleshooting more efficient.