MultiScanner - Modular File Scanning/Analysis Framework
MultiScanner is a file analysis framework that assists the user in evaluating a set of files by automatically running a suite of tools for the user and aggregating the output. Tools can be custom built...
View ArticleTruehunter - Tool to detect TrueCrypt containers
The goal of Truehunter is to detect TrueCrypt containers using a fast and memory efficient approach. It was designed as a PoC some time ago as I couldn't find any open source tool with the same...
View ArticleDBShield - Database Firewall Written In Go
Protects your data by inspecting incoming queries from your application server and rejecting abnormal ones.How it works?For example, this is how web server normally interacts with database server:By...
View ArticleBlindy - Simple Script for running BruteForce Blind MySql Injection
Simple script for running bruteforce blind MySql injectionThe script will run through queries listed in sets in provided file (default-queries.json as default) and try to bruteforce places with {}...
View ArticlePowerMeta - PowerShell Script to Search Publicly Files for a Particular...
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files...
View ArticleWPSeku - Simple Wordpress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Usage _ __ ___ __ ___ ___| | ___ _ \ \ /\ / / '_ \/ __|/ _ \ |/ / |...
View ArticleKali Linux 2017.1 Release
As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release...
View ArticleInfectPE - Inject Custom Code into PE File
Using this tool you can inject x-code/shellcode into PE file. InjectPE works only with 32-bit executable files.Why you need InjectPE?You can test your security products.Use in a phishing campaign.Learn...
View ArticleInspeckage - (Android Package Inspector) Dynamic Analysis With Api Hooks,...
Inspeckage is a tool developed to offer dynamic analysis of Android applications. By applying hooks to functions of the Android API, Inspeckage will help you understand what an Android application is...
View ArticleLeviathan - Wide Range Mass Audit Toolkit
Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan,...
View ArticleOperative Framework v1.0b - Fingerprint Framework
This is a framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search, Linkedin search, Reverse email whois,...
View ArticlePowerStager - A payload stager using PowerShell
This script creates an executable stager that downloads a selected powershell payload, loads it into memory and executes it using obfuscated EC methods. The script will also encrypt the stager for...
View ArticleEAPHammer - Targeted Evil Twin Attacks Against WPA2-Enterprise Networks...
EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus...
View ArticleInfoga v3.0 - Email Information Gathering
Infoga is a tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers). Is a really simple tool, but very effective for the early stages of a...
View ArticleWeb Exploit Detector - Tool To Detect Possible Infections, Malicious Code And...
The Web Exploit Detector is a Node.js application (and NPM module) used to detect possible infections, malicious code and suspicious files in web hosting environments. This application is intended to...
View Articlemimipenguin - A Tool To Dump The Login Password From The Current Linux User
A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz.DetailsTakes advantage of cleartext credentials in memory by...
View ArticleLynis 2.5.0 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleHydra 8.5 - Network Logon Cracker
A very fast network logon cracker which support many different services.See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa.Number one of the biggest...
View ArticleMalwareSearch - A Command Line Tool To Find Malwares
Tool developed for searching malwares at openmalware.org by command line, allowing specific malware download by shell. Soon we'll input more sources like MalShare, MalwareBlacklist, Malware.lu's...
View ArticleCowrie - SSH/Telnet Honeypot
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.Cowrie is developed by Michel Oosterhof.FeaturesSome...
View Article