CloudUnflare - Reconnaissance Real IP Address For Cloudflare Bypass
Reconnaissance Real IP address for Cloudflare Bypass.Preparation:1. CompleteDNS APICreate an account at completedns.com and verify first.Input your email and password on CompleteDNS_Login variable in...
View ArticleXORpass - Encoder To Bypass WAF Filters Using XOR Operations
XORpass is an encoder to bypass WAF filters using XOR operations.Installation & Usagegit clone https://github.com/devploit/XORpasscd XORpass$ php encode.php STRING$ php decode.php "XORed...
View ArticleLinPwn - Interactive Post Exploitation Tool
LinPwn is a interactive tool created to assist you in post exploitationenumeration and privilege escalation.ConnectionSet your IP and port you want it to connect to in the Connection class.Place the...
View ArticlePockint - A Portable OSINT Swiss Army Knife For DFIR/OSINT Professionals
POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable GUI program (to be carried within USBs or investigation VMs),...
View ArticleThreatIngestor - Extract And Aggregate Threat Intelligence
An extendable tool to extract and aggregate IOCs from threat feeds.Integrates out-of-the-box with ThreatKB and MISP, and can fit seamlessly into any existing worflow with SQS, Beanstalk, and custom...
View ArticleUBoat - HTTP Botnet Project
A POC HTTP Botnet designed to replicate a full weaponised commercial botnetDisclaimerThis project should be used for authorized testing or educational purposes only.The main objective behind creating...
View ArticlePESTO - PE (files) Statistical Tool
PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching for every PE binary in a whole directory, and saving results in a database.It...
View ArticleAtomShields Cli - Security Testing Framework For Repositories And Source Code
AtomShields Cli is a Command-Line Interface to use the software AtomShieldsInstallationpip install atomshieldscliBasic usageascli <action> <context> --target <path> --name...
View ArticleVirtuailor - IDAPython Tool For Creating Automatic C++ Virtual Tables In IDA Pro
Virtuailor is an IDAPython tool that reconstructs vtables for C++ code written for intel architecture, both 32bit and 64bit code and AArch64 (New!). The tool constructed from 2 parts, static and...
View ArticleGosec - Golang Security Checker
Inspects source code for security problems by scanning the Go AST.InstallCI Installation# binary will be $GOPATH/bin/goseccurl -sfL https://raw.githubusercontent.com/securego/gosec/master/install.sh |...
View ArticleDr. Memory - Memory Debugger For Windows, Linux, Mac, And Android
Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory (including outside of...
View ArticleFail2Ban - Daemon To Ban Hosts That Cause Multiple Authentication Errors
Fail2Ban scans log files like /var/log/auth.log and bans IP addresses conducting too many failed login attempts. It does this by updating system firewall rules to reject new connections from those IP...
View ArticleUptux - Linux Privilege Escalation Checks (Systemd, Dbus, Socket Fun, Etc)
Specialized privilege escalation checks for Linux systems.Implemented so far:Writable systemd paths, services, timers, and socket unitsDisassembles systemd unit files looking for: References to...
View ArticleezXSS - An Easy Way For Penetration Testers And Bug Bounty Hunters To Test...
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.Current featuresSome features ezXSS hasEasy to use dashboard with statics, payloads,...
View ArticleMallory - HTTP/HTTPS Proxy Over SSH
HTTP/HTTPS proxy over SSH.InstallationLocal machine: go get github.com/justmao945/mallory/cmd/malloryRemote server: need our old friend sshdConfiguerationConfig fileDefault path is...
View ArticleTrivy - A Simple And Comprehensive Vulnerability Scanner For Containers,...
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI.AbstractTrivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner...
View ArticleXray - A Tool For Recon, Mapping And OSINT Gathering From Public Networks
XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network mapping automatic.How Does it Work?XRay is a very simple tool, it works...
View ArticleSparrow-Wifi - Next-Gen GUI-based WiFi And Bluetooth Analyzer For Linux
Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for...
View ArticleEyeWitness - Tool To Take Screenshots Of Websites, Provide Some Server Header...
EyeWitness is designed to take screenshots of websites provide some server header info, and identify default credentials if known.EyeWitness is designed to run on Kali Linux. It will auto detect the...
View ArticleGithub-Dorks - Collection Of Github Dorks And Helper Tool To Automate The...
Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection of github dorks that can reveal sensitive personal and/or organizational...
View Article