Cheat Engine - A Development Environment Focused On Modding
Cheat Engine is an open source tool designed to help you with modifying single player games running under window so you can make them harder or easier depending on your preference(e.g: Find that 100hp...
View ArticleOSFClone - Open Source Utility To Create And Clone Forensic Disk Images
OSFClone is a free, self-booting solution which enables you to create or clone exact raw disk images quickly and independent of the installed operating system. In addition to raw disk images, OSFClone...
View ArticlePHP Security Check List
PHP: Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML. The PHP development, which was first created by...
View ArticleHexRaysCodeXplorer - Hex-Rays Decompiler Plugin For Better Code Navigation
The Hex-Rays Decompiler plugin for better code navigation in RE process. CodeXplorer automates code REconstruction of C++ applications or modern malware like Stuxnet, Flame, Equation, Animal Farm...
View ArticleIptables Essentials - Common Firewall Rules And Commands
Tools to help you configure Iptables Shorewall - advanced gateway/firewall configuration tool for GNU/Linux. Firewalld - provides a dynamically managed firewall. UFW - default firewall configuration...
View ArticleReko - A General Purpose Binary Decompiler
Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU General Public License.The project consists of front...
View ArticleCommand Injection Payload List
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application...
View ArticleSALT - SLUB ALlocator Tracer For The Linux Kernel
Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit, to debug your own kernel code, and, more importantly, to play with the kernel heap...
View ArticleMetasploit Cheat Sheet
The Metasploit Project is a computer security project that provides information on vulnerabilities, helping in the development of penetration tests and IDS signatures.Metasploit is a popular tool used...
View ArticleOphcrack - A Windows Password Cracker Based On Rainbow Tables
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User...
View ArticleHT-WPS Breaker - High Touch WPS Breaker
High Touch WPS Breaker [HT-WB] is a small tool based on the bash script language, it can help you to extract the WPS pin of many vulnerable routers and get the password, in the last you want to notice...
View ArticleNtopng - Web-based Traffic And Security Network Traffic Monitoring
ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap and it has been written in a portable way in order to...
View ArticleAngr - A Powerful And User-Friendly Binary Analysis Platform
angr is a platform-agnostic binary analysis framework. It is brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish,...
View ArticleVSHG - Hardware resistance & enhanced security for GnuPG
VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetricencryption .About VSHGVSHG ( Very secure hash...
View ArticleImago Forensics - Imago Is A Python Tool That Extract Digital Evidences From...
Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If you need to extract digital evidences and you have a...
View ArticleStrelka - Scanning Files At Scale With Python And ZeroMQ
Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see:...
View ArticlePhantom Evasion - Python AV Evasion Tool Capable To Generate FUD Executable...
Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64...
View ArticleFaraday v3.6 - Collaborative Penetration Test and Vulnerability Management...
Here are the main new features and improvements in Faraday v3.6:Welcome Service NowA new way to send vulnerabilities is available! We integrated Faraday with Service Now, giving you more options to...
View ArticleCMSeeK v1.1.1 - CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...
What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
View ArticleRpi-Hunter - Automate Discovering And Dropping Payloads On LAN Raspberry Pi's...
Automate discovering and dropping payloads on LAN Raspberry Pi's via ssh.rpi-hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...
View Article