Ghost Framework - An Android Post-Exploitation Framework That Exploits The...
About Ghost FrameworkGhost Framework is an Androidpost-exploitation framework that exploits theAndroid Debug Bridge to remotely access an Android device. Ghost Frameworkgives you the power and...
View ArticleFreki - Malware Analysis Platform
Freki is a free and open-source malware analysis platform.GoalsFacilitate malwareanalysis and reverse engineering;Provide an easy-to-use REST API for different projects;Easy deployment (via...
View ArticlePoshBot - Powershell-based Bot Framework
PoshBot is a chat bot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules are loaded into PoshBot and instantly become available as bot commands....
View ArticleE9Patch - A Powerful Static Binary Rewriting Tool
E9Patch is a powerful static binary rewriting tool for x86_64 Linux ELF binaries. E9Patch is:Scalable: E9Patch can reliably rewrite large/complex binaries including web browsers (>100MB in...
View ArticleGo365 - An Office365 User Attack Tool
Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on...
View ArticleScilla - Information Gathering Tool (DNS/Subdomain/Port Enumeration)
Information Gathering Tool - Dns/Subdomain/Port EnumerationInstallationFirst of all, clone the repo locallygit clone https://github.com/edoardottt/scilla.gitScilla has external dependencies, so they...
View ArticleBento - A Minimal Fedora-Based Container For Penetration Tests And CTF With...
A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin.Bento Toolkit is a simple and minimal docker container for penetration testers and CTF players.It has the...
View ArticleBheem - Simple Collection Of Small Bash-Scripts Which Runs Iteratively To...
Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process & store output in an organized way. This project was created initially...
View ArticleFawkes - Tool To Search For Targets Vulnerable To SQL Injection (Performs The...
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q, --query - Dork that will be used in the search engine. -r, --results -...
View ArticleSploit - Go Package That Aids In Binary Analysis And Exploitation
Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit is to be able to have a well designed API with functionality that rivals...
View ArticleWatcher - Open Source Cybersecurity Threat Hunting Platform
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation.It should be used on webservers and available on Docker.Watcher...
View ArticleSharpMapExec - A Sharpen Version Of CrackMapExec
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss army knife that is made for running on Windows which is often a requirement during...
View Article0D1N v3.4 - Tool For Automating Customized Attacks Against Web Applications...
0d1n is a tool for automating customized attacks against web applications. This tool is very faster because uses thread pool and C language.0d1n is a tool for automating customized attacks against web...
View ArticleGrawler - Tool Which Comes With A Web Interface That Automates The Task Of...
Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.General infoGrawler aims to automate the...
View ArticleKenzer - Automated Web Assets Enumeration And Scanning
Automated Web Assets Enumeration & ScanningInstructions for runningCreate an account on ZulipNavigate to Settings > Your Bots > Add a new botCreate a new generic bot named kenzerAdd all the...
View ArticleGRecon - Your Google Recon Is Now Automated
GRecon (Greei-Conn) is a simple python tool that automates the process of Google Based Recon AKA Google Dorking The current Version 1.0 Run 7 Search Queries (7 Micro-Plugins) on the spicified Target...
View ArticleSwego - Swiss Army Knife Webserver In Golang
Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features.UsageHelp$ ./webserver -helpweb subcommand -bind string Bind Port (default "8080") -certificate...
View ArticleCensys-Python - An Easy-To-Use And Lightweight API Wrapper For The Censys...
An easy-to-use and lightweight API wrapper for the Censys Search Engine (censys.io). Python 3.6+ is currently supported.Getting StartedThe library can be installed using pip.$ pip install censysTo...
View ArticleVulmap - Web Vulnerability Scanning And Verification Tools
Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions....
View ArticleAura - Python Source Code Auditing And Static Analysis On A Large Scale
Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code published on PyPI.Project goals:provide an automated monitoring...
View Article