Justniffer - Network TCP Packet Sniffer
Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all...
View ArticleCDF - Crypto Differential Fuzzing
CDF is a tool to automatically test the correctness and security of cryptographic software. CDF can detect implementation errors, compliance failures, side-channel leaks, and so on.CDF implements a...
View ArticleUp (Ultimate Plumber) - Tool For Writing Linux Pipes With Instant Live Preview
up is the Ultimate Plumber, a tool for writing Linux pipes in a terminal-based UI interactively, with instant live preview of command results.The main goal of the Ultimate Plumber is to help...
View ArticleLazygit - Simple Terminal UI For Git Commands
A simple terminal UI for git commands, written in Go with the gocui library.Are YOU tired of typing every git command directly into the terminal, but you're too stubborn to use Sourcetree because...
View ArticlePompem - Exploit and Vulnerability Finder
Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work...
View ArticleSSRFmap - Automatic SSRF Fuzzer And Exploitation Tool
SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp request file as input and a parameter to fuzz.Server Side...
View ArticleKaboom - Automatic Pentest
kaboom is a script that automates the penetration test. It performs several tasks for each phase of pentest:Information gathering [nmap-unicornscan]TCP scanUDP scanVulnerability assessment...
View ArticlePonce - IDA Plugin For Symbolic Execution Just One-Click Away!
Ponce (pronounced [ 'poN θe ] pon-they ) is an IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in an easy and intuitive fashion. With Ponce...
View ArticleDCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications
DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to...
View ArticleTROMMEL - Sift Through Embedded Device Files To Identify Potential Vulnerable...
TROMMEL sifts through embedded device files to identify potential vulnerable indicators.TROMMEL identifies the following indicators related to:Secure Shell (SSH) key filesSecure Socket Layer (SSL) key...
View ArticleFibratus - Tool For Exploration And Tracing Of The Windows Kernel
Fibratus is a tool which is able to capture the most of the Windowskernel activity - process/thread creation and termination, context switches, file system I/O, registry, network activity, DLL...
View ArticleEgress-Assess - Tool Used To Test Egress Data Detection Capabilities
Egress-Assess is a tool used to test egress data detection capabilities.SetupTo setup, run the included setup script, or perform the following:Install pyftpdlibGenerate a server certificate and store...
View ArticleHoneyPy - A Low To Medium Interaction Honeypot
A low interaction honeypot with the capability to be more of a medium interaction honeypot.HoneyPy is written in Python2 and is intended to be easy to:install and deployextend with plugins and...
View ArticleBoNeSi - The DDoS Botnet Simulator
BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks.What traffic can be generated?BoNeSi...
View ArticleMaltego CE - An Interactive Data Mining Tool That Renders Directed Graphs For...
Maltego CE is the community version of Maltego that is available for free after a quick online registration. Maltego CE includes most of the same functionality as the commercial version however it has...
View ArticleOSINT-SPY - Search using OSINT (Open Source Intelligence)
Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep...
View ArticleGameGuardian - Android Game Hack/Alteration Tool
GameGuardian is a game hack/alteration tool. With it, you can modify money, HP, SP, and much more. You can enjoy the fun part of a game without suffering from its unseasonable design.Requires Android:...
View ArticleSecLists - A Collection Of Multiple Types Of Lists Used During Security...
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs,...
View ArticleEraser - Secure Erase Files from Hard Drives on Windows
Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is...
View ArticleBeEF - The Browser Exploitation Framework Project
What is BeEF?BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne attacks against clients,...
View Article