PCILeech - Direct Memory Access (DMA) Attack Software
The PCILeech use the USB3380 chip in order to read from and write to the memory of a target system. This is achieved by using DMA over PCI Express. No drivers are needed on the target system. The...
View Articledatasploit - A tool to perform various OSINT techniques
A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data. Overview of the tool: Performs OSINT on a domain...
View ArticleBinProxy - BinProxy is a proxy for arbitrary TCP connections
BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem. Installation Prerequisites Ruby 2.3 or later A C compiler, Ruby headers, etc., are needed...
View ArticleBORG - Terminal Based Search For Bash Snippets
Borg was built out of the frustration of having to leave the terminal to search and click around for bash snippets. Borg's succint output also makes it easy to glance over multiple snippets quickly....
View ArticleGoogle Explorer - Google Mass Explorer
[+]Â Google Mass ExplorerThis is a automated robot for google search engine. Make a google search, and parse the results for a especific exploit you define. The options can be listed with --help...
View ArticleLynis 2.4.0 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleGATTacker - BLE (Bluetooth Low Energy) Man-in-the-Middle
A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks. Prerequisites see: https://github.com/sandeepmistry/noble...
View ArticleWhitewidow 1.5.0 - SQL Vulnerability Scanner
Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file...
View ArticleSniffles - Packet Capture Generator for IDS and Regular Expression Evaluation
Sniffles is a tool for creating packet captures that will test IDS that use fixed patterns or regular expressions for detecting suspicious behavior. Sniffles works very simply. It takes a set of...
View ArticleRadium-Keylogger - Python keylogger with multiple features
Python keylogger with multiple features.FeaturesApplications and keystrokes loggingScreenshot loggingDrive tree structureLogs sending by emailPassword Recovery forChromeMozillaFilezillaCore...
View ArticleOpenDoor - OWASP Directory Access Scanner
This application scans the site directories and find all possible ways to login, empty directories and entry points. Scans conducted in the dictionary that is included in this application. This...
View ArticleRecuperaBit - A Tool For Forensic File System Reconstruction
A software which attempts to reconstruct file system structures and recover files. Currently it supports only NTFS. RecuperaBit attempts reconstruction of the directory structure regardless of: missing...
View ArticleHoper - Trace URL's jumps across the rel links to obtain the last URL
It shows all the hops that makes a url you specify to reach its endpoint. For example if you want to see the entire trip by email URL or like a URL shorten. Hoper returns you all URLs redirections....
View ArticleWAFNinja - Penetration testers favorite for WAF Bypassing
WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be...
View Articlegeoip-attack-map - Cyber Security GeoIP Attack Map Visualization
This geoip attack map visualizer was developed to display network attacks on your organization in real time. The data server follows a syslog file, and parses out source IP, destination IP, source...
View Articlehget - Rocket Fast, Interruptable, Resumable Download Accelerator
Rocket fast download accelerator written in golang. Current program working in unix system only. NOTE : hget is currently on highly development, its usage, architecture and code may change anytime at...
View Articleneedle - The iOS Security Testing Framework
Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps. Description Assessing the security of an iOS application typically requires a...
View ArticleCuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android...
View ArticlePsTools - Utilities for listing the processes running on remote computers,...
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and...
View ArticlejSQL Injection v0.77 - Java application for automatic SQL database injection.
jSQL Injection is a lightweight application used to find database information from a distant server. It's is free , open source and cross-platform (Windows, Linux, Mac OS X). jSQL Injection is also...
View Article