IoT-PT - A Virtual Environment For Pentesting IoT Devices
A new pentesting virtual environment for IoT DevicesDownload Link : https://drive.google.com/open?id=1XwGqkLax2irSPpwEpeAqypl9vEywzw3DMD5 : d9c20057b14cfa3fb25f744813b828df ; SHA1:...
View ArticleSinter - A User-Mode Application Authorization System For MacOS Written In Swift
Sinter is a 100% user-mode endpoint security agent for macOS 10.15 and above, written in Swift.Sinter uses the user-mode EndpointSecurity API to subscribe to and receive authorization callbacks from...
View ArticlePurpleSharp - C# Adversary Simulation Tool That Executes Adversary Techniques...
Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection & response capabilities has proven to be...
View ArticleKali Linux 2020.3 Release - Penetration Testing and Ethical Hacking Linux...
Time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates.A quick overview of what’s new since the last release in May 2020:New Shell– Starting...
View ArticlePagodo - Automate Google Hacking Database Scraping And Searching
The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet. There are 2 parts. The first is ghdb_scraper.py that...
View ArticleReconSpider - Most Advanced Open Source Intelligence (OSINT) Framework For...
ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources.ReconSpider can be used...
View ArticleDropEngine - Malleable Payloads!
By @s0lst1c3DisclaimerDropEngine (the "Software") and associated documentation is provided “AS IS”. The Developer makes no other warranties, express or implied, and hereby disclaims all implied...
View ArticleWonitor - Fast, Zero Config Web Endpoint Change Monitor
fast, zero config web endpoint change monitor. for comparing responses, a selected list of http headers and the full response body is stored on a local key/value store file. no configuration needed.to...
View ArticleADBSploit - A Python Based Tool For Exploiting And Managing Android Devices...
A python based tool for exploiting and managing Android devices via ADBCurrently on developmentScreenrecordStream ScreenrecordExtract ContactsExtract SMSExtract Messasing App Chats...
View ArticleSecGen - Create Randomly Insecure VMs
SecGen creates vulnerable virtual machines, lab environments, and hacking challenges, so students can learn security penetration testing techniques.Boxes like Metasploitable2 are always the same, this...
View ArticleCloud-Sniper - Virtual Security Operations Center
Cloud Security OperationsWhat is Cloud Sniper?Cloud Sniper is a platform designed to manage Security Operations in cloud environments. It is an open platform which allows responding to security...
View ArticleScan-For-Webcams - Scan For Webcams In The Internet
Automatically scan for publically accessible webcams around the internetUsagepython MJPG.py : for public MJPG streamers around the internetpython webcamXP.py : for public webcamXP streamers around the...
View ArticleIntel Owl - Analyze Files, Domains, IPs In Multiple Ways From A Single API At...
Do you want to get threat intelligence data about a file, an IP or a domain?Do you want to get this kind of data from multiple sources at the same time using a single API request?You are in the right...
View ArticlePyre-Check - Performant Type-Checking For Python
Pyre is a performant type checker for Python compliant with PEP 484. Pyre can analyze codebases with millions of lines of code incrementally – providing instantaneous feedback to developers as they...
View ArticleParth - Heuristic Vulnerable Parameter Scanner
Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually contains URLs as the value and hence often falls victim to file...
View ArticleYeti - Your Everyday Threat Intelligence
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve...
View ArticleAWS Recon - Multi-threaded AWS Inventory Collection Tool With A Focus On...
A multi-threaded AWS inventory collection tool.The creators of this tool have a recurring need to be able to efficiently collect a large amount of AWS resource attributes and metadata to help clients...
View ArticleVolExp - Volatility Explorer
This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility Framework (https://github.com/volatilityfoundation/volatility). This program functions similarly...
View ArticleezEmu - Simple Execution Of Commands For Defensive Tuning/Research
ezEmu enables users to test adversary behaviors via various execution techniques. Sort of like an "offensive framework for blue teamers", ezEmu does not have any networking/C2 capabilities and rather...
View ArticleHack-Tools - The All-In-One Red Team Extension For Web Pentester
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used...
View Article