ReconCat - Tool To Fetch Archive Url Snapshots From Archive.org
A small Php application to fetch archive url snapshots from archive.org.using it you can fetch complete list of snapshot urls of any year or complete list of all years possible.Made Specially for...
View ArticleMimic - A Tool For Covert Execution In Linux
mimic is a tool for covert execution on Linux x86_64.What is "covert execution"?Covert execution is the art of hiding a process. In this case, mimic hides the process in plain sight. mimic can launch...
View ArticleRp++ - Tool That Aims To Find ROP Sequences In PE/Elf/Mach-O X86/X64 Binaries
rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O (doesn't support the FAT binaries) x86/x64 binaries. It is open-source, documented with Doxygen (well, I'm trying to..)...
View ArticleAWS Pwn - A Collection Of AWS Penetration Testing Junk
This is a collection of horribly written scripts for performing various tasks related to penetration testing AWS. Please don't be sad if it doesn't work for you. It might be that AWS has changed since...
View ArticleMalScan - A Simple PE File Heuristics Scanners
MalScan is a simple PE File Heuristics Scanners written in python that you can use to quickly analyze a PE file and find out whether anything suspicious exists. It is a simple tool so doesn't offers...
View ArticleTinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence...
The most complete open-source tool for Twitter intelligence analysisIntroductiontinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence)...
View ArticleHashtopolis - A Hashcat Wrapper For Distributed Hashcracking
Hashtopolis is a multi-platform client-server tool for distributing hashcat tasks to multiple computers. The main goals for Hashtopolis's development are portability, robustness, multi-user support,...
View ArticleGPG Reaper - Obtain/Steal/Restore GPG Private Keys From Gpg-Agent Cache/Memory
Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memoryThis POC demonstrates method for obtaining GPG private keys from gpg-agent memory under Windows.Normally this should be possible only...
View ArticleROPgadget - This Tool Lets You Search Your Gadgets On Your Binaries To...
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF/PE/Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures....
View ArticleLinux Exploit Suggester - Linux Privilege Escalation Auditing Tool
Often during the penetration test engagement the security analyst faces the problem of identifying privilege escalation attack vectors on tested Linux machine(s). One of viable attack vectors is using...
View ArticleSubfinder - Subdomain Discovery Tool That Can Discover Massive Amounts Of...
SubFinder is a subdomaindiscovery tool that uses various techniques to discover massive amounts of subdomains for any target. It has been aimed as a successor to the sublist3r project. SubFinder uses...
View ArticleSandcat Browser 6.0 - Pentest And Developer-Oriented Web Browser
Sandcat is a lightweight multi-tabbed web browser that combines the speed and power of Chromium and Lua. Sandcat comes with built-in live headers, an extensible user interface and command line console,...
View ArticlePenCrawLer - An Advanced Web Crawler And DirBuster
An Advanced Web Crawler and DirBuster PeNCrawLer is an advanced webcrawler and dirbuster designed to using in penetration testing based on Windows Os.Web Crawler Features:Follow RedirectsRendering...
View ArticleSMBrute - SMB Protocol Bruteforce
SMBrute is a program that can be used to bruteforce username and passwords of servers that are using SMB (Samba).Install SMBrute$ git clone https://github.com/m4ll0k/SMBrute.git smbrute$ cd smbrute$...
View ArticleHow Can Manufacturing Companies Improve Network Access and Security?
The manufacturing industry faces complex challenges other sectors of the economy need not worry about. Manufacturers rely heavily on everything from positive global economic trends to laws that lift...
View ArticleJCS - Joomla Vulnerability Component Scanner
JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. The database can update from several resources...
View ArticleRTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security...
Red Team Arsenal is a web/network security scanner which has the capability to scan all company's online facing assets and provide an holistic security view of any security anomalies. It's a closely...
View ArticleEternal Check - Ip Vulnerability Check To Eternal Blue, Romance, Synergy &...
Ip Vulnerability Check To Eternal Blue, Romance, Synergy & Champion:Eternal CheckEternal Check verifies if an ip is vulnerable to the smb vulnerabilitiesEternal BlueEternal RomanceEternal...
View ArticleWHP - Microsoft Windows Hacking Pack
M$ Windows Hacking Pack===========Tools here are from different sources. The repo is generally licensed with WTFPL, but some content may be not (eg. sysinternals)."pes" means "PE Scambled". It's useful...
View ArticleMalPipe - Malware/IOC Ingestion And Processing Engine
MalPipe is a modular malware (and indicator) collection and processing framework. It is designed to pull malware, domains, URLs and IP addresses from multiple feeds, enrich the collected data and...
View Article