Lazydocker - The Lazier Way To Manage Everything Docker
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not working? Maybe a service is down. docker-compose ps. Yep, it's that...
View ArticleSshuttle - Transparent Proxy Server That Works As A Poor Man'S VPN. Forwards...
As far as I know, sshuttle is the only program that solves the following common case:Your client machine (or router) is Linux, FreeBSD, or MacOS.You have access to a remote network via ssh.You don't...
View ArticleChepy - A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.
Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef. A reasonable amount of effort was put behind Chepy to make it compatible to the various...
View ArticlexShock - Shellshock Exploit
xShock ShellShock (CVE-2014-6271)This tool exploits shellshock.Written by Hulya KarabagVersion 1.0.0Instagram: Capture the RootScreenshotsHow to useRead MeAll founded directories will be saved in...
View ArticleInstaSave - Python Script To Download Images, Videos & Profile Pictures From...
InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.FeaturesDownload Instagram PhotosDownload Instagram VideosDownload Instagram Profile...
View ArticleMaryam v1.4.0 - Open-source Intelligence(OSINT) Framework
OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If you have skill in Metasploit or Recon-ng, you can...
View ArticleXXExploiter - Tool To Help Exploit XXE Vulnerabilities
I wrote this tool to help me testing XXE vulnerabilities.It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration.IMPORTANT: This tool is...
View ArticleuDork - Google Hacking Tool
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so...
View ArticleHTTPS Everywhere - A Browser Extension That Encrypts Your Communications With...
A browser extension that encrypts your communications with many websites that offer HTTPS but still allow unencrypted connections.Getting StartedGet the packages you need and install a git hook to run...
View ArticleAstra - Automated Security Testing For REST API's
REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be used by security engineers or developers as an integral part of their process, so...
View ArticleScoringEngine - Scoring Engine For Red/White/Blue Team Competitions
Scoring Engine for Red/White/Blue Team CompetitionsGetting startedDownload Docker. If you are on Mac or Windows, Docker Compose will be automatically installed. On Linux, make sure you have the latest...
View ArticleFinalRecon v1.0.2 - OSINT Tool For All-In-One Web Reconnaissance
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.FeaturesFinalRecon provides detailed information...
View ArticleStarkiller - A Frontend For PowerShell Empire
Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS. If you'd like to contribute please follow the Contribution guide.Getting StartedTo run Starkiller, you...
View ArticleXSS-LOADER - XSS Payload Generator / XSS Scanner / XSS Dork Finder
All in one tools for XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDERWritten by Hulya KarabagInstagram: Hulya KarabagScreenshotsHow to useRead MeThis tool creates payload for use in xss...
View ArticleZphisher - Automated Phishing Tool
Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing...
View ArticleEnvizon v3.0 - Network Visualization And Vulnerability Management/Reporting
This tool is designed, developed and supported by evait security. In order to give something back to the security community, we publish our internally used and developed, state of the art network...
View ArticleKatana - A Python Tool For Google Hacking
Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and support TorIt becomes more powerful in combination with GHDBInstallation :Use the package manager pip...
View ArticleRapidPayload - Metasploit Payload Generator
Framework RapidPayload - MetasploitPayload Generator Requirements OpenJDK 8 (JAVA), or superiors versions. Metasploit Apktool Python3 Execution: git clone...
View ArticleNinja - Open Source C2 Server Created For Stealth Red Team Operations
Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directoty enumeration without being detected by SIEM and AVs , Ninja still in beta version and when the...
View ArticleConEmu - Customizable Windows Terminal With Tabs, Splits, Quake-Style,...
ConEmu-Maximus5 is a Windows console emulator with tabs, which represents multiple consoles as one customizable GUI window with various features.Initially, the program was created as a companion to Far...
View Article