You can find all my projects mainly on my GitHub : https://github.com/raphaelthief
This tool is one of my main projects. It's updated frequently and
I use it on a regular basis. Its purpose is to find and correlate
digital traces left by an individual. Initially, it was built with a
purely offensive mindset : the goal was to simulate research
capabilities for extortion scenarios and see how far such an approach
could be pushed. Over time, I expanded its features to cover almost
every aspect of OSINT related to digital footprint tracking.
I
wanted to push the OSINT phase beyond the commonly known geolocation
focus. While the methodologies integrated in the tool don't
revolutionize the OSINT field, they do allow for discoveries that are
often overlooked by popular tools. It also automates certain tasks
that were previously monopolized by specific utilities.
thiefhunter is also one of my main projects. It was created to
accelerate exploit research related to software versions and to
automate certain phases of bug bounty hunting. This includes searching
for injection points, sensitive subdomains, interesting HTTP headers,
and more.
It also allows enumeration of web application versions
on a given page and automatically identifies CVEs linked to vulnerable
versions, providing direct access to related exploits. Other features
include automated tests for exposed sensitive files, potential SQL
injections, and more.
One particularly useful capability is
WordPress version detection, which is done in a single request and
requires no token, unlike tools like WPScan. In fact, my own tests
have shown better detection accuracy and reliability compared to
WPScan during this phase.
This project stems from an article I wrote. The idea was to bypass UAC
and counter Microsoft's updates that made some basic payloads
detectable. So I created several payloads in Python and C to evade
Windows Defender's security mechanisms, along with instructions
for manually bypassing UAC.
Before writing the article, I
researched various data breach forums where FUD droppers were being
sold. These tools added Defender exclusions and executed files with
admin privileges via UAC bypasses, without alerting the user. I found
that the method used was based on fodhelper. That’s when I decided to
create my own FUD payload. It turned out to be fairly straightforward,
and I really enjoyed analyzing and documenting Microsoft's
(unsuccessful) attempts to block this technique!
I'm a big fan of airodump-ng. However, when scanning a large
number of targets across both 2.4GHz and 5GHz bands, it quickly
becomes limited by the display—simply because there’s no built-in
scrolling! This limitation caught my attention, and since no solution
was provided by the developers, I decided to build my own script to
enable real-time scrolling.
In addition to that, I added several
extra features, such as hardware vendor detection via MAC address for
clients (not just access points), which I find particularly valuable.
I also implemented client-to-access point association tracking, WPS
status display, and more.
Most of these features had to be
developed from scratch, or in some cases re-implemented, since I rely
solely on the real-time CSV output generated by airodump-ng. For
example, WPS status isn’t included in the CSV, so I had to dive into
the .cap file, analyze it with Wireshark, and correctly interpret the
data.
Overall, I find this scanner extremely useful and now
prefer using it over airodump-ng directly. I’ve also integrated
aircrack-ng’s airdcap-ng into the script.
This post is somewhat outdated, but some of the prompts still work
quite well! This project is simply a compilation of a few prompts I
created to bypass the ethical safeguards of AI systems. At the time
they were made, they worked on all known LLMs (ChatGPT, MISTRAL,
DeepSeek, Grok, etc.).
The project stems from an article I wrote
explaining the methodology used to bypass the ethical logic embedded
by developers in these LLMs.
It’s pretty fun—and completely
unfiltered! Of course, to demonstrate how it works, you have to get a
little trashy.
Below is the result of my favorite prompt (in
French)...
I'm a big fan of compromises via Rubber Ducky. This project is outdated but still interesting! The goal was to create a series of ready-to-use payloads with automated customization. These payloads included browser data theft (infostealer), backdoor installation, and more ...
This project aims to automate email generation from the source code of a loaded LinkedIn page for phishing campaign operations. After analyzing the email format during an initial OSINT phase, the program automatically generates a mailing list based on the first and last names of targets, following the chosen format. I originally created this tool to also perform brute-force operations on APIs that lacked rate limiting on employee login endpoints.
This program automates CTI monitoring through several well-known dependencies such as Theleton and DNSTWIST. It collects data from Telegram groups, sorts it by activity date, and extracts specific keywords to help efficiently prioritize and filter intelligence. It is also particularly useful for identifying onion links related to ransomware operators.
This program allows for quick monitoring of various RSS feeds and sends instant popup notifications on Windows. Nothing more, nothing less !
This is an old project designed to audit Windows configurations using several enumeration bash scripts. The program targets various potential attack vectors, such as displaying saved Wi-Fi keys, detecting infostealer target files in browsers, unquoted paths, and more.
This program is designed to perform dictionary attacks on WordPress targets via the XML-RPC entry point. It also exploits a vulnerability present in WordPress versions prior to 4.4 to enable mass brute-force attacks. The tool includes precise request handling to fine-tune the attack strategy according to the target's defensive mechanisms.