hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And...
Improve your security and privacy by blocking ads, tracking and malware domains.What is this for?This POSIX-compliant shell script, designed for Unix-like systems, gets a list of domains that serve...
View ArticleFi6S - IPv6 Network Scanner Designed To Be Fast
fi6s is a IPv6 port scanner designed to be fast. This is achieved by sending and processing raw packets asynchronously. The design and goal is pretty similar to Masscan, though it is not as...
View ArticleXSS Payload List - Cross Site Scripting Vulnerability Payload List
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web...
View ArticleSpookFlare v2.0 - Loader, Dropper Generator With Multiple Features For...
SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection....
View ArticleHuntpad - The Bug Hunter's Notepad
Syhunt Huntpad is a notepad application with features that are particularly useful to penetration testers and bug hunters - a collection of common injection string generators, hash generators, encoders...
View ArticleKurukshetra - A Framework For Teaching Secure Coding By Means Of Interactive...
Kurukshetra is a web framework that’s developed with the aim of being the first open source framework which provides a solid foundation to host reasonably complex secure coding challenges while still...
View ArticleThe Axer - Tool To Automate The Procedure Of Creating Your Payloads With...
The axer will replace the manual procedure of creating your payloads with msfvenom , making it easier and a lot quicker.THE AXER WILL LET YOU CHOOSE THE PLATFORM , FORMAT, ENCODER, Bind with another...
View ArticleDrupwn - Drupal Enumeration & Exploitation Tool
Drupwn claims to provide an efficient way to gather drupal information.Further explaination on blog post articleSupported tested versionDrupal 7Drupal 8Execution modeDrupwn can be run, using two...
View ArticleWordpress Exploit Framework v1.9.2 - Framework For Developing And Using...
A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.What do I need to run it?Ensure that you have Ruby >= 2.4.3 installed...
View ArticleZoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner
Zoom is a lightning fast wordpress vulnerability scanner equipped with subdomain & infinite username enumeration.. It doesn't support plugin & theme enumeration at the moment.What's infinite...
View ArticleAutoTTP - Automated Tactics Techniques & Procedures
Automated Tactics Techniques & Procedures. Re-running complex sequences manually for regression tests, product evaluations, generate data for researchers & so on can be tedious. I toyed with...
View ArticleVayne-RaT - An Advanced C# .NET RAT
Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#.Features:Multi-ThreadedCMD ShellFile Manager (Download & Upload)Remote DesktopPassword RecoveryAssembly BuilderScan-Time...
View ArticleGPON - Python Exploit For Remote Code Executuion On GPON Home Routers...
RCE on GPON home routers (CVE-2018-10561)VulnerabilityMany routers today use GPON internet, and a way to bypass all authentication on the devices (CVE-2018-10561) was found by VPNMentor. With this...
View ArticlePAVELOW - Exploit Toolbox
PAVELOW helps you with your exploiting and vulnerability searching adventures on KALI Linux by using a few different pre-installed tools among several others that PAVELOW will installed & setup for...
View ArticleFreeRADIUS Server Configuration Tool
Developed for the Linux operating system and written in the python programming language. The purpose of the program is to configure the FreeRADIUS server easily and quickly.To get a grasp of what...
View ArticleShellPop - Pop Shells Like A Master
Pop shells like a master Shell pop is all about popping shells. With this tool you can generate easy and sofisticated reverse or bind shell commands to help you during penetration tests. Don't waste...
View ArticlePortspoof - Enhance Your Systems Security Through A Set Of New Camouflage...
The Portspoof program primary goal is to enhance your system's security through a set of new camouflage techniques. As a result of applying them your attackers' port scan result will become entirely...
View ArticleWhonow - A "Malicious" DNS Server For Executing DNS Rebinding Attacks On The...
A malicious DNS server for executing DNS Rebinding attacks on the fly. whonow lets you specify DNS responses and rebind rules dynamically using domain requests themselves.# respond to DNS queries for...
View ArticleTheDoc - Simple But Very Useful SQLMAP Automator With Built In Admin Finder,...
TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!Abilities:Counts total injections tried.Crawls given domain for...
View ArticleSamurai Email Discovery - Is A Email Discovery Framework That Grabs Emails...
SED is a email discovery framework created 100% in BASH that grabs emails via google dork, company name, or domain name.Requirementsapt-install lynxScreenshotsPossibly more features such as an OSINT...
View Article