Scallion - GPU-based Onion Addresses Hash Generator
Scallion lets you create vanity GPG keys and .onion addresses (for Tor'shidden services) using OpenCL.Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server...
View ArticleAaia - AWS Identity And Access Management Visualizer And Anomaly Finder
Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j. This helps in identifying the outliers easily. Since it is based on neo4j , one can...
View ArticleGophish - Open-Source Phishing Toolkit
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness...
View ArticleGrouper2 - Find Vulnerabilities In AD Group Policy
What is it for?Grouper2 is a tool for pentesters to help find security-related misconfigurations in Active Directory Group Policy.It might also be useful for other people doing other stuff, but it is...
View ArticleTeleGram-Scraper - Telegram Group Scraper Tool (Fetch All Information About...
Telegram Group Scraper Tool. Fetch All Information About Group Members• How To Install & Setup API ( Termux )• API SetupGo to http://my.telegram.org and log in.Click on API development tools and...
View ArticleCorsy v1.0 - CORS Misconfiguration Scanner
Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.RequirementsCorsy only works with Python 3 and has the following depencies:tldrequestsTo install these...
View ArticleTAS - A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries
A tiny framework for easily manipulate the tty and create fake binaries.How it works?The framework has three main functions, tas_execv, tas_forkpty, and tas_tty_loop.tas_execv: It is a function similar...
View ArticleAlertResponder - Automatic Security Alert Response Framework By AWS...
AlertResponder is a serverless framework for automatic response of security alert.OverviewAlertResponder receives an alert that is event of interest from security view point and responses the alert...
View ArticleYARASAFE - Automatic Binary Function Similarity Checks with Yara
SAFE is a tool developed to create Binary Functions Embedding developed by Massarelli L., Di Luna G.A., Petroni F., Querzoni L. and Baldoni R. You can use SAFE to create your function embedding to use...
View ArticleKsDumper - Dumping Processes Using The Power Of Kernel Space
I always had an interest in reverse engineering. A few days ago I wanted to look at some game internals for fun, but it was packed & protected by EAC (EasyAntiCheat). This means its handle were...
View ArticleSharpStat - C# Utility That Uses WMI To Run "cmd.exe /c netstat -n", Save The...
C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotelyDescriptionThis script will attempt to connect to all the supplied...
View ArticleCheck-LocalAdminHash - A PowerShell Tool That Attempts To Authenticate To...
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator....
View ArticleHershell - Multiplatform Reverse Shell Generator
Simple TCP reverse shell written in Go.It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception.Supported OS...
View ArticleAgentSmith-HIDS - Open Source Host-based Intrusion Detection System (HIDS)
Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However, it can be used as a high performance 'Host Information...
View ArticleMemhunter - Live Hunting Of Code Injection Techniques
Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident...
View ArticleAircrack-ng 1.6 - Complete Suite Of Tools To Assess WiFi Network Security
Aircrack-ng is a complete suite of tools to assess WiFi network security.It focuses on different areas of WiFi security:Monitoring: Packet capture and export of data to text files for further...
View ArticleSocialscan - Check Email Address And Username Availability On Online...
socialscan offers accurate and fast checks for email address and username usage on online platforms.Given an email address or username, socialscan returns whether it is available, taken or invalid on...
View ArticleMimir - Smart OSINT Collection Of Common IOC Types
Smart OSINT collection of common IOC types.OverviewThis application is designed to assist security analysts and researchers with the collection and assessment of common IOC types. Accepted IOCs...
View ArticleCredNinja - A Multithreaded Tool Designed To Identify If Credentials Are...
This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can be used for more covert operations (including some additions below), it...
View ArticleApplicationInspector - A Source Code Analyzer Built For Surfacing Features Of...
Microsoft Application Inspector is a software source code analysis tool that helps identify and surface well-known features and other interesting characteristics of source code to aid in determining...
View Article