RouterSploit v3.0 - Exploitation Framework For Embedded Devices
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.It consists of various modules that aids penetration testing operations:exploits - modules that take...
View ArticleDefectDojo - Application Vulnerability Correlation And Security Orchestration...
DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans,...
View ArticleBackdoorme - Powerful Auto-Backdooring Utility
Tools like metasploit are great for exploiting computers, but what happens after you've gained access to a computer? Backdoorme answers that question by unleashing a slew of backdoors to establish...
View ArticleBlackArch Linux v2018.06.01 - Penetration Testing Distribution
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1981tools. You can install tools individually or in groups. BlackArch Linux...
View ArticleCSS Keylogger - Chrome Extension And Express Server That Exploits Keylogging...
Chrome extension and Express server that exploits keylogging abilities of CSS.To useSetup Chrome extensionDownload repository git clone https://github.com/maxchehab/CSS-KeyloggingVisit...
View ArticleDARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital...
DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.DARKSURGEON has three stated goals:Accelerate incident response, digital...
View ArticleDejaVU - Open Source Deception Framework
Deception techniques if deployed well can be very effective for organizations to improve network defense and can be a useful arsenal for blue teams to detect attacks at very early stage of cyber kill...
View ArticleDumpsterDiver - Tool To Search Secrets In Various Filetypes
DumpsterDiver is a tool used to analyze big volumes of various file types in search of hardcoded secret keys (e.g. AWS Access Key, Azure Share Key or SSH keys). Additionally, it allows creating a...
View ArticlePhpSploit - Stealth Post-Exploitation Framework
PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access...
View ArticleWifite 2.1.0 - Automated Wireless Attack Tool
A complete re-write of wifite, a Python script for auditing wireless networks.Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!What's new in...
View ArticleAutoSQLi - An Automatic SQL Injection Tool Which Takes Advantage Of Googler,...
An Automatic SQL Injection Tool Which Takes Advantage Of ~DorkNet~ Googler, Ddgr, WhatWaf And Sqlmap.FeaturesSave System - there is a complete save system, which can resume even when your pc crashed. -...
View ArticleSleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Points
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque...
View ArticleNamechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than...
Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.Use:Search available username: ./namechk.sh <username> -auSearch available username on...
View ArticleMsploitego - Pentesting Suite For Maltego Based On Data In A Metasploit Database
msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even...
View ArticleHash-Buster v2.0 - Tool Which Uses Several APIs To Perform Hash Lookups
FeaturesAutomatic hash type identificationSupports MD5, SHA1, SHA2Can extract & crack hashes from a fileCan find hashes from a directory, recursively6 robust APIsAs powerful as Hulk, as intelligent...
View ArticleBadMod v2.0 - Detect Website CMS, Website Scanner & Auto Exploiter
Auto exploiter & get all server sites & bing dorker.Version 2.0Fixed colors bugFixed permissions bugAdded new option to scan single targetAdded new option to scan joomla& wordpress...
View ArticleGpredict - Satellite Tracking Application
Gpredict is a real-time satellite tracking and orbit prediction application. It can track a large number of satellites and display their position and other data in lists, tables, maps, and polar plots...
View ArticleOmnibus - Open Source Intelligence Collection, Research, And Artifact Management
An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source...
View ArticleNipe - A Script To Make TOR Network Your Default Gateway
Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by...
View ArticleRastrea2R - Collecting &Amp; Hunting For IOCs With Gusto And Style
Ever wanted to turn your AV console into an Incident Response& Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows...
View Article