dorkScanner - A Typical Search Engine Dork Scanner Scrapes Search Engines...
A typical search engine dork scanner that scrapes search engines with queries that you provide in order to find vulnerable URLs.IntroductionDorking is a technique used by newsrooms, investigative...
View ArticleWordListGen - Super Simple Python Word List Generator For Fuzzing And Brute...
Super Simple Python Word List Generator for Password Cracking (Hashcat)!I know what your are thinking. Why create another word list generator? Well, I needed something very simple I could modify on the...
View ArticleConverting MBOX to Outlook Easily
Mail transfer is a common search query. Most commonly, users may migrate due to personal preferences, corporate policies, or support issues. Systems based on the MBOX format are tricky: you may easily...
View ArticleGIVINGSTORM - Infection Vector That Bypasses AV, IDS, And IPS
The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual stage VBS infection vector, and a dual stage HTA infection vector. The variables take into account C2...
View ArticleOWASP Threat Dragon - Cross-Platform Threat Modeling Application
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations. It is an OWASP Incubator Project....
View ArticleParamSpider - Mining Parameters From Dark Corners Of Web Archives
ParamSpider : Parameter miner for humans.Key Features : Finds parameters from web archives of the entered domain. Finds parameters from subdomains as well. Gives support to exclude urls with specific...
View ArticleFinDOM-XSS - A Fast DOM Based XSS Vulnerability Scanner With Simplicity
FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSSvulnerability in a fast manner.Installation$ git clone...
View ArticleSanta - A Binary Whitelisting/Blacklisting System For macOS
Santa is a binary whitelisting/blacklisting system for macOS. It consists of a kernel extension (or a system extension on macOS 10.15+) that monitors for executions, a userland daemon that makes...
View ArticleDebotnet - A Tiny Portable Tool For Controlling Windows 10's Many...
A free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private.Your preparation for the Net!The Windows 10 default privacy settings leave a lot...
View ArticlePadding-Oracle-Attacker - CLI Tool And Library To Execute Padding Oracle...
CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.InstallMake sure Node.js is installed, then run$ npm install --global...
View ArticleDroneSploit - Drone Pentesting Framework Console
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like...
View ArticleX64Dbg - An Open-Source X64/X32 Debugger For Windows
An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. There are many features available and a comprehensive...
View ArticleMaskprocessor - High-Performance Word Generator With A Per-Position...
High-Performance word generator with a per-position configureable charsetMask attackTry all combinations from a given keyspace just like in Brute-Force attack, but more specific.Advantage over...
View ArticleNatlas - Scaling Network Scanning
You've got a lot of maps and they are getting pretty unruly. What do you do? You put them in a book and call it an atlas. This is like that, except it's a website and it's a collection of nmaps. The...
View ArticleCapsulecorp-Pentest - Vagrant VirtualBox Environment For Conducting An...
Vagrant VirtualBox Environment For Conducting An Internal Network Penetration Test.1. Capsulecorp PentestThe Capsulecorp Pentest is a small virtual network managed by vagrant and ansible. It contains...
View ArticleWiFi Passview v4.0 - An Open Source Batch Script Based WiFi Passview For...
WiFi Passview is an open-source batch script-based program that can recover your WiFi Password easily in seconds. This is for Windows OS only. Basically, this scripted program has the same function as...
View ArticleSaferwall - A Hackable Malware Sandbox For The 21St Century
Saferwall is an open source malware analysis platform.It aims for the following goals:Provide a collaborative platform to share samples among malware researchers.Acts as a system expert, to help...
View ArticleTsunami - A General Purpose Network Security Scanner With An Extensible...
Tsunami is a general-purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.To learn more about Tsunami, visit our...
View ArticleSteganographer - Hide Files Or Data In Image Files
This Module will hide files inside images ( currenlty PNG ) and export the modified image to diskThe maximum size of file which can be hidden inside an image depends on the dimension of the...
View ArticleT14M4T - Automated Brute-Forcing Attack Tool
t14m4t is an automated brute-forcing attack tool, wrapper of THC-Hydra and Nmap Security Scanner.t14m4t is scanning an user defined target (or a document containing targets) for open ports of services...
View Article