All posts by Marta Sienicka

06

Aug'20

UEFI_RETool - A tool for UEFI firmware reverse engineering

UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …

Read More

03

Aug'20

Cloudsplaining - AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.

Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report. …

Read More

29

Jul'20

Intelspy - Perform Automated Network Reconnaissance Scans

Perform automated network reconnaissance scans to gather network intelligence. IntelSpy is a multi-threaded network intelligence tool that performs automated network …

Read More

28

Jul'20

Osintgram is a OSINT tool on Instagram

Osintgram is an OSINT tool on Instagram. It offers an interactive shell to perform analysis on the Instagram account of …

Read More

27

Jul'20

autoenum - Automatic Service Enumeration Script

Autoenum is a recon tool that performs automatic enumeration of services discovered. I built this to save some time during …

Read More

24

Jul'20

Onex - a Kali Linux hacking tools installer for Termux and other linux distribution.

"Onex a hacking tools library." Onex is a Kali Linux hacking tools installer for termux and other Linux distribution. It's …

Read More

23

Jul'20

hackerEnv - automation tool that quickly and easily sweep IPs and scan ports, vulnerabilities and exploit them

hackerEnv is an automation tool that quickly and easily sweeps IPs and scan ports, vulnerabilities, and exploit them. Then, it …

Read More

22

Jul'20

ADB-Toolkit - Tool for testing your android device and hack someone android phone

ADB-Toolkit is a BASH Script with 28 options and an METASPLOIT Section which has 6 options which is made to …

Read More

17

Jul'20

InjuredAndroid - A vulnerable Android application that shows simple examples of vulnerabilities in a CTF style

InjuredAndroid - A vulnerable Android application with CTF examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for …

Read More

13

Jul'20

GIVINGSTORM - Infection vector that bypasses AV, IDS, and IPS. (For now...)

The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual-stage VBS infection vector, …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013