FinalRecon v1.1.0 - The Last Web Recon Tool You'll Need
FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results....
View ArticleGo_Parser - Yet Another Golang Binary Parser For IDAPro
Yet Another Golang Binary Parser For IDAProï’¡NOTE: This master branch is written in Python2 for IDAPython, and tested only on IDA7.2/IDA7.0. If you use IDAPython with Python3 and higher version of...
View ArticleGarud - An Automation Tool That Scans Sub-Domains, Sub-Domain Takeover And...
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.Requirements: Go Language, Python 2.7 or Python 3. System...
View ArticleMacC2 - Mac Command And Control That Uses Internal API Calls Instead Of...
MacC2 is a macOS post exploitation tool written in python that uses Objective C calls or python libraries as opposed to command line executions. The client is written in python2, which though...
View ArticleGping - Ping, But With A Graph
Ping, but with a graph.InstallFYI: The old Python version can be found under the python tag.Homebrew (MacOS + Linux)brew tap orf/brewbrew install gpingBinaries (Windows)Download the latest release from...
View ArticleRehex - Reverse Engineers' Hex Editor
A cross-platform (Windows, Linux, Mac) hex editor for reverse engineering, and everything else.FeaturesLarge (1TB+) file supportDecoding of integer/floating point value typesDisassembly of machine...
View ArticleOpenEDR - Open EDR Public Repository
We at OpenEDR believe in creating a cybersecurity platform with its source code openly available to public, where products and services can be provisioned and managed together. EDR is our starting...
View ArticleTeler - Real-time HTTP Intrusion Detection
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community.FeaturesReal-time: Analyze logs and...
View ArticleKali Linux 2020.4 - Penetration Testing and Ethical Hacking Linux Distribution
 Time for another Kali Linux release! – Kali Linux 2020.4. This release has various impressive updates:ZSH is the new default shell– We said it was happening last time, Now it has. ZSH. Is. Now....
View ArticleDoctrack - Tool To Manipulate And Insert Tracking Pixels Into Office Open XML...
Tool to manipulate and insert tracking pixels into Office Open XML documents.FeaturesInsert tracking pixels into Office Open XML documents (Word and Excel)Inject template URL for remote template...
View ArticleBulwark - An Organizational Asset And Vulnerability Management Tool, With...
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.Jira IntegrationNotePlease keep in mind, this project is in early...
View ArticleInvoke-Antivm - Powershell Tool For VM Evasion
Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell.CompatibilityRun the script check-compatibility.ps1 to check what modules or functions...
View ArticleRoutopsy - A Toolkit Built To Attack Often Overlooked Networking Protocols
Routopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP) and First-Hop Redundancy Protocols (FHRP). Most...
View ArticleFuzzilli - A JavaScript Engine Fuzzer
A (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated to JavaScript.UsageThe basic steps to use this fuzzer...
View ArticleSIRAS - Security Incident Response Automated Simulations
Security Incident Response Automated Simulations (SIRAS) are internal/controlled actions that provide a structured opportunity to practice the incident response plan and procedures during a realistic...
View ArticleAmlsec - Automated Security Risk Identification Using AutomationML-based...
This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results of the risk identification...
View ArticleOsi.Ig - Information Gathering Instagram
The InstagramOSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their profileThe information includes:[ profile ] : user id,...
View ArticleToothPicker - An In-Process, Coverage-Guided Fuzzer For iOS
ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to analyze various Bluetooth protocols on iOS. As it is...
View ArticleXerror - Fully Automated Pentesting Tool
Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks. Xerror will perform all tests and, at the end generate two...
View ArticleUAFuzz - Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities
Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to different security contexts: (1) bug reproduction,...
View Article