File-Unpumper - Tool That Can Be Used To Trim Useless Things From A PE File...
file-unpumper is a powerful command-line utility designed to clean and analyze Portable Executable (PE) files. It provides a range of features to help developers and security professionals work with PE...
View ArticleDamn-Vulnerable-Drone - An Intentionally Vulnerable Drone Hacking Simulator...
The Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.About...
View ArticleSecator - The Pentester'S Swiss Knife
secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and it is designed to improve productivity for pentesters and security...
View ArticlePolyDrop - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload...
BYOSI- Bring-Your-Own-Script-Interpreter- Leveraging the abuse of trusted applications, one is able to deliver a compatible script interpreter for a Windows, Mac, or Linux system as well as malicious...
View ArticleSafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks...
SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits.A web application firewall helps protect web apps by filtering and monitoring HTTP traffic...
View ArticleDocf-Sec-Check - DockF-Sec-Check Helps To Make Your Dockerfile Commands More...
DockF-Sec-Check helps to make your Dockerfile commands more secure.Done[x] First-level security notification in the DockerfileTODO List[ ] Correctly detect the Dockerfile.[ ] Second-level security...
View ArticleLazywarden - Automatic Bitwarden Backup
Secure, Automated, and Multi-Cloud Bitwarden Backup and Import SystemLazywarden is a Pythonautomation tool designed to Backup and Restore data from your vault, including Bitwarden attachments. It...
View ArticleSnoop - OSINT Tool For Research Social Media Accounts By Username
OSINT Tool for research social media accounts by usernameInstall Requests```Install Requests pip install requests#### Install BeautifulSoup```Install BeautifulSouppip install beautifulsoup4Execute the...
View ArticlegitGRAB - This Tool Is Designed To Interact With The GitHub API And Retrieve...
This tool is designed to interact with the GitHub API and retrieve specific user details, repository information, and commit emails for a given user.Install Requestspip install requestsExecute the...
View ArticleTelegram-Story-Scraper - A Python Script That Allows You To Automatically...
A Python script that allows you to automatically scrape and download stories from your Telegram friends using the Telethon library. The script continuously monitors and saves both photos and videos...
View ArticleLobo Guará - Cyber Threat Intelligence Platform
Lobo Guará is a platform aimed at cybersecurity professionals, with various features focused on Cyber Threat Intelligence (CTI). It offers tools that make it easier to identify threats, monitor data...
View ArticleMoukthar - Android Remote Administration Tool
Remote adminitration tool for androidFeaturesPermissions bypass (android 12 below) https://youtube.com/shorts/-w8H0lkFxb0Keylogger https://youtube.com/shorts/Ll9dNrkjFOANotifications listenerSMS...
View ArticleTelegram-Scraper - A Powerful Python Script That Allows You To Scrape...
A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library. Features include real-time continuous scraping, media downloading, and data...
View ArticleQuickResponseC2 - A Command & Control Server That Leverages QR Codes To Send...
QuickResponseC2 is a stealthy Command and Control (C2) framework that enables indirect and covert communication between the attacker and victim machines via an intermediate HTTP/S server. All network...
View ArticleInstagram-Brute-Force-2024 - Instagram Brute Force 2024 Compatible With...
Instagram Brute Force CPU/GPU Supported 2024(Use option 2 while running the script.)(Option 1 is on development)(Chrome should be downloaded in device.)Compatible and Tested (GUI Supported Operating...
View ArticleTorward - An Improved Version Based On The Torghost-Gn And Darktor Scripts,...
Torward is an improved version based on the torghost-gn and darktor scripts, designed to enhance anonymity on the Internet. The tool prevents data leaks and forces all traffic from our computer to be...
View ArticleTelegram-Checker - A Python Tool For Checking Telegram Accounts Via Phone...
Enhanced version of bellingcat's TelegramPhone Checker!A Python script to check Telegram accounts using phone numbers or username.✨ Features🔍 Check single or multiple phone numbers and usernames📁...
View ArticleWappalyzer-Next - Python library that uses Wappalyzer extension (and its...
This project is a command line tool and python library that uses Wappalyzerextension (and its fingerprints) to detect technologies. Other projects emerged after discontinuation of the official open...
View ArticlePANO - Advanced OSINT Investigation Platform Combining Graph Visualization,...
PANO is a powerful OSINT investigation platform that combines graph visualization, timeline analysis, and AI-powered tools to help you uncover hidden connections and patterns in your data.Getting...
View ArticleTruffleHog Explorer - A User-Friendly Web-Based Tool To Visualize And Analyze...
Welcome to TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog. TruffleHog is one of the most powerful secrets discovery, classification,...
View ArticleMaryam - Open-source Intelligence(OSINT) Framework
OWASPMaryam is a modular open-source framework based on OSINT and data gathering. It is designed to provide a robust environment to harvest data from open sources and search engines quickly and...
View ArticleCentralizedFirewall - Provides A Firewall Manager API Designed To Centralize...
Firewall Manager API ProjectInstallationFollow these steps to set up and run the API project:1. Clone the Repositorygit clone https://github.com/adriyansyah-mf/CentralizedFirewallcd...
View ArticleBytesrevealer - Online Reverse Enginerring Viewer
Bytes Revealer is a powerful reverse engineering and binary analysis tool designed for security researchers, forensic analysts, and developers. With features like hex view, visual representation,...
View ArticleGhost-Route - Ghost Route Detects If A Next JS Site Is Vulnerable To The...
A Python script to check Next.js sites for corrupt middlewarevulnerability (CVE-2025-29927).The corrupt middleware vulnerability allows an attacker to bypass authentication and access protected routes...
View ArticleText4Shell-Exploit - A Custom Python-based Proof-Of-Concept (PoC) Exploit...
A custom Python-based proof-of-concept (PoC) exploit targeting Text4Shell (CVE-2022-42889), a critical remote code execution vulnerability in Apache Commons Text versions < 1.10. This exploit...
View Article