TheTHE - Simple, Shareable, Team-Focused And Expandable Threat Hunting...
TheTHE is an environment intended to help analysts and hunters over the early stages of their work in an easier, unified and quicker way. One of the major drawbacks when dealing with a hunting is the...
View ArticlePbtk - A Toolset For Reverse Engineering And Fuzzing Protobuf-based Apps
Protobuf is a serialization format developed by Google and used in an increasing number of Android, web, desktop and more applications. It consists of a language for declaring data structures, which is...
View ArticlenodeCrypto v2.0 - Ransomware Written In NodeJs
nodeCrypt is a linuxRansomware written in NodeJs that encrypt predefined files.This project was created for educational purposes, you are the sole responsible for the use of nodeCrypto.Demo...
View ArticleReconCobra - Complete Automated Pentest Framework For Information Gathering
ReconCobraReconcobra is Foot printing software for Ultimate Information GatheringKali, Parrot OS, Black Arch, Termux, Android Led TVInterfaceSoftware have 82 Options with full automation with powerful...
View ArticleSecretx - Extracting API Keys And Secrets By Requesting Each URL At The Your...
Extracting api keys and secrets by requesting each url at the your list.Installationpython3 -m pip install -r requirements.txtUsagepython3 secretx.py --list urlList.txt --threads 15optional arguments:...
View ArticleSilver - Mass Scan IPs For Vulnerable Services
masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel...
View ArticleAutomatic API Attack Tool - Customizable API Attack Tool Takes An API...
Imperva's customizable API attack tool takes an API specification as an input, and generates and runs attacks that are based on it as an output.The tool is able to parse an API specification and create...
View ArticlePathAuditor - Detecting Unsafe Path Access Patterns
The PathAuditor is a tool meant to find file access related vulnerabilities by auditing libc functions.The idea is roughly as follows:Audit every call to filesystem related libc functions performed by...
View ArticleLazyrecon - Script To Automate Your Reconnaissance Process In An Organized...
LazyRecon is a script written in Bash, it is intended to automate some tedious tasks of reconnaissance and information gathering. This tool allows you to gather some information that should help you...
View ArticleFindomain v0.9.3 - The Fastest And Cross-Platform Subdomain Enumerator
The fastest and cross-platform subdomain enumerator.What Findomain can do?It table gives you a idea why you should use findomain and what it can do for you. The domain used for the test was aol.com in...
View ArticleOKadminFinder - Admin Panel Finder / Admin Login Page Finder
OKadminFinder: Easy way to find admin panel of site.RequirementsLinuxsudo apt install torsudo apt install python3-socks (optional)pip3 install --user -r requirements.txtWindows download tor expert...
View ArticleBetterBackdoor - A Backdoor With A Multitude Of Features
A backdoor is a tool used to gain remote access to a machine.Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is...
View ArticleSpraykatz - A Tool Able To Retrieve Credentials On Windows Machines And Large...
Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.It simply tries to procdump machines and parse dumps remotely in...
View ArticleShelly - Simple Backdoor Manager With Python (Based On Weevely)
Shelly adalah sebuah tool sederhana yang ditulis menggunakan Python, yang berfungsi untuk meremote sebuah website Instalation :$ git clone https://github.com/tegal1337/Shelly$ cd Shelly $ python3...
View ArticlehuskyCI - Performing Security Tests Inside Your CI
huskyCI is an open-source tool that performs security tests inside CI pipelines of multiple projects and centralizes all results into a database for further analysis and metrics.How does it work?The...
View ArticleAttackSurfaceMapper - A Tool That Aims To Automate The Reconnaissance Process
Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack surface of your target. You feed in a mixture of one or more...
View ArticlePylane - An Python VM Injector With Debug Tools, Based On GDB
Pylane is a python vm injector with debug tools, based on gdb and ptrace. Pylane uses gdb to trace python process, inject and run some code in its python vm.Usageuse inject command to inject a python...
View ArticlePAKURI - Penetration Test Achieve Knowledge Unite Rapid Interface
What's PAKURIIn Japanese, imitating is called “Pakuru”.ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)eat with a wide open mouthsteal when one isn't looking, snatch, swipecopy...
View ArticleMalwinx - Just A Normal Flask Web App To Understand Win32Api With Code...
A normal flask web app to learn win32api with code snippets and references.PrerequisiteYou need to download the following package before starting itpip install flaskpip install pefilepip install...
View ArticleQuark-Engine - An Obfuscation-Neglect Android Malware Scoring System
An Obfuscation-Neglect Android Malware Scoring SystemConceptsAndroid malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a...
View Article