Munstar0s's Projects
Tool to find and extract credentials from phone configuration files hosted on CUCM
forked- IDArc tool for identifying compressed file formats
Blind WAF identification tool
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Infoga - Email OSINT
A Telegram Mass Surveillance Bot in Python
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
a low(zero) cost threat intelligence&response tool against phishing domains
Python Jira library. Development chat available on https://web.libera.chat/?channel=#pycontribs
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
Cross-platform, fast, feature-rich, GPU based terminal
A Blazing fast Security Auditing tool for Kubernetes
Automatic Enumeration Tool based in Open Source tools
Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.
A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Work-in-progress port of Samy Kamkar's MagSpoof project (http://samy.pl/magspoof/) to the Flipper Zero. Enables wireless emulation of magstripe data, using the inbuilt RFID coil as an electromagnet.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
Small utility program to perform multiple operations for a given subnet/CIDR ranges.
Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulation.
Model parallel transformers in JAX and Haiku
A bash script that automates the scanning of a target network for HTTP resources through XXE
Microsoft Authentication Library (MSAL) for Python makes it easy to authenticate to Azure Active Directory. These documented APIs are stable https://msal-python.readthedocs.io. If you have questions but do not have a github account, ask your questions on Stackoverflow with tag "msal" + "python".
Mind-Maps of Several Things
Main MineMeld documentation repo
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.