Ransomware Encryption Analysis Tool
Forensic tool for analyzing ransomware encryption schemes: identify algorithm, mode, key derivation, and find weaknesses.
Professional offensive security tools & exploit frameworks
Forensic tool for analyzing ransomware encryption schemes: identify algorithm, mode, key derivation, and find weaknesses.
Blockchain transaction analysis tool: trace fund flow in Bitcoin/Ethereum, identify mixers and exchanges.
Python script that analyzes AWS IAM policies and detects privilege escalation paths: AssumeRole chains, policy misconfigs, wildcard permissions.
Tool that audits Kubernetes RBAC configurations: detects overprivileged roles, service accounts with mounted secrets, pod security violations.
Password spraying tool against Azure AD/Entra ID with smart lockout evasion: IP rotation, intelligent timing, MFA detection.
Collection of 6 Docker container escape techniques with working exploits: docker.sock, privileged mode, cap_sys_admin, cgroups.
Static analyzer for Terraform configurations: detects open security groups, public buckets, disabled encryption, IAM misconfigs.
Tool for exploiting SSRF against cloud metadata services: AWS IMDSv1/v2, GCP, Azure, DigitalOcean. Extracts temporary credentials.
Scanner for public and misconfigured S3 buckets: wordlist enumeration, permission detection, selective download of sensitive content.
Script that searches for GCP service account keys in repositories, buckets, and compromised filesystems. Validates and enumerates permissions.
Techniques and scripts for compromising CI/CD pipelines: GitHub Actions injection, GitLab CI secrets extraction, Jenkins credential theft.
Cloud firewall/security group rule analyzer for AWS, Azure, and GCP: detects permissive rules, unnecessary ports, generates hardening report.