RetDec - A Retargetable Machine-Code Decompiler Based On LLVM
RetDec is a retargetable machine-code decompiler based on LLVM.The decompiler is not limited to any particular target architecture, operating system, or executable file format:Supported file formats:...
View ArticleAntiDisposmail - Detecting Disposable Email Addresses
Antbot.pw provides a free, open API endpoint for checking a domain or email address against a frequently-updated list of disposable domains. CORS is enabled for all originating domains, so you can call...
View ArticleOpen Redirect Payload List
Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By...
View ArticleApk-Mitm - A CLI Application That Prepares Android APK Files For HTTPS...
A CLI application that automatically prepares Android APK files for HTTPS inspectionInspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works....
View ArticleFunctrace - A Function Tracer
functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based on DynamoRIO):disassemble all the...
View ArticleNgrev - Tool For Reverse Engineering Of Angular Applications
Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and...
View ArticleCAINE 11 - GNU/Linux Live Distribution For Digital Forensics Project, Windows...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari - Italy).CAINE...
View ArticleReconPi - Set Up Your Raspberry Pi To Perform Basic Recon Scans
ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.Start using that Raspberry Pi -- I know you all have one laying around somewhere...
View ArticleGenact - A Nonsense Activity Generator
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills. Just open a few instances of genact and watch the show....
View ArticleFileintel - A Modular Python Application To Pull Intelligence About Malicious...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so new intelligence sources can be easily added.Files are identified by file hash...
View ArticleFfuf - Fast Web Fuzzer Written In Go
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values, POST data, and different parts of URL, including GET...
View ArticleSplunk Attack Range - A Tool That Allows You To Create Vulnerable...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a small lab infrastructure as close as possible to your production environment. This...
View ArticleHashCobra - Hash Cracking Tool
hashcobra Hash Cracking tool.Usage$ ./hashcobra -H--==[ hashcobra by sepehrdad ]==--usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> - hashing algorithm [default: md5] - ? to...
View ArticleRTTM - Real Time Threat Monitoring Tool
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing...
View ArticleExploitivator - Automate Metasploit Scanning And Exploitation
This has only been tested on Kali.It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/Install the...
View ArticleDsiem - Security Event Correlation Engine For ELK Stack
Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.Dsiem provides OSSIM-style correlation for normalized...
View ArticleCyberRange - The Open-Source AWS Cyber Range
This CyberRange project represents the first open-source Cyber Range blueprint in the world.This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering, &...
View ArticleHaaukins - A Highly Accessible And Automated Virtualization Platform For...
Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and Golang), the communication and orchestration between...
View ArticleEXIST - Web Application For Aggregating And Analyzing Cyber Threat Intelligence
EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence).EXIST is written by the following software.Python 3.5.4Django 1.11.22ConceptEXIST is a web application for...
View ArticleNginx Log Check - Nginx Log Security Analysis Script
Nginx Log Security Analysis ScriptFeaturesStatistics Top 20 AddressSQL injection analysisScanner alert analysisExploit detectionSensitive path accessFile contains attackWebshellFind URLs with response...
View Article