Dependency-Track - An Intelligent Software Composition Analysis (SCA)...
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease...
View ArticleMSDAT - Microsoft SQL Database Attacking Tool
MSDAT (Microsoft SQL Database Attacking Tool) is an open source penetration testing tool that tests the security of Microsoft SQL Databases remotely.Usage examples of MSDAT:You have a Microsoft...
View ArticleFaraday Beta v3.0 - Collaborative Penetration Test and Vulnerability...
This new version has made major architectural changes to adapt the software to the new challenges of cybersecurity. It focuses on processing large volumes of data and facilitating user interaction with...
View ArticleProbeManager - Centralize Management Of Intrusion Detection System Like...
It is common to see that many IDS (intrusion and detection system), including the software and its rules are not updated regularly. This can be explained by the fact the software and rule management is...
View ArticleGuasap - WhatsApp Forensic Tool
The Guasap Forensic implemented in Python under the GNU General Public License, for the extraction and analysis of files, data bases and logs for forensic WhatsApp.What it does?Check root in...
View ArticleSn1per v5.0 - Automated Pentest Recon Scanner
Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for...
View ArticleTP-Link-defaults - Python Script For Trying Default Passwords For Some...
Python script for trying default passwords for some TP-Link HotspotsInspired by Usageusage: scan.py [-h] [-p]Python script for trying default passwords for some TP-Link Hotspotsoptional arguments: -h,...
View ArticleDNS Rebind Toolkit - A Front-End JavaScript Toolkit For Creating DNS...
DNS Rebind Toolkit is a frontend JavaScript framework for developing DNS Rebindingexploits against vulnerable hosts and services on a local area network (LAN). It can be used to target devices like...
View ArticleGlobaLeaks - The Open-Source Whistleblowing Software
GlobaLeaks is open-source / free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and Digital Human Rights.For the user manual...
View ArticlePh0Neutria - A Malware Zoo Builder That Sources Samples Straight From The Wild
ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manageability.This project was inspired by Ragpicker...
View ArticleIntrigue-Core - Discover Your Attack Surface
Intrigue-core is a framework for automated attack surface discovery. There are a number of use cases:Application and Infrastructure (Asset) DiscoverySecurity Research and Vulnerability DiscoveryMalware...
View ArticleBST (Binary String Toolkit) - Quickly And Easily Convert Binary Strings For...
The Binary String Toolkit or BST for short is a rather simple utility to convert binary strings to various formats suitable for later inclusions in source codes, such as those used to develop exploits...
View ArticleTrackerjacker - Like Nmap For Mapping Wifi Networks You'Re Not Connected To,...
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring.PyPI page: https://pypi.python.org/pypi/trackerjackerInstallpip3...
View ArticleAutocrack - Hashcat Wrapper To Help Automate The Cracking Process
This python script is a Hashcat (https://hashcat.net) wrapper to help automate the cracking process. The script includes multiple functions to select a set of wordlists and rules, as well as the...
View ArticleTHRecon - Threat Hunting Reconnaissance Toolkit
Collect endpoint information for use in incident response triage / threat hunting / live forensics using this toolkit. When a security alert raises concern over a managed system, this toolkit aims to...
View ArticleDirhunt - Find Web Directories Without Bruteforce
Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of" mode enabled. Dirhunt is also useful if the directory...
View ArticleLynis 2.6.6 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleOrbit - Cryptocurrency Wallets Relationship Visualizer
Give it a blockchain based crypto wallet address and it will crawl 3 levels deep in transaction data to plot a graph out of the information.UsageRun orbit.py with python3 as followspython3...
View ArticleBlack Owl - Tool To Gather Information, Based On Operative-Framework
This is a simple tool to gather information, based on Operative-Framework.Requirementsrequestspythonwhoisbeautifulsoup4Install requirements$ pip install -r requirements.txtHow to use$ git clone...
View ArticleWebkiller - Tool Information Gathering Write By Python.
Tool Information Gathering Write With Python.██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗██║ █╗ ██║█████╗ ██████╔╝█████╔╝ ██║██║...
View Article