Volatility 2.6 - Advanced Memory Forensics Framework
In 2007, the first version of The Volatility Framework was released publicly at Black Hat DC. The software was based on years of published academic research into advanced memory analysis and forensics....
View ArticlenWatch - Tool for Host Discovery, PortScanning and Operating System...
nWatch is a handy tool for host discovery, portscanning and operating system fingerprinting.Demo videoRequirementsnmapscapycoloramactypesInstallation and executionInstall the requirements Then you can...
View ArticleSET v7.7 - The Social-Engineer Toolkit “Blackout”
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been...
View ArticleGPS-SDR-SIM - Software-Defined GPS Signal Simulator
GPS-SDR-SIM generates GPS baseband signal data streams, which can be converted to RF using software-defined radio (SDR) platforms, such as bladeRF, HackRF, and USRP.Windows build instructionsStart...
View ArticleDropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For...
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.DO NOT USE THIS FOR MALICIOUS PURPOSES. THE AUTHOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THIS...
View ArticleNagaScan - NagaScan is a distributed passive scanner for Web application.
What is NagaScanNagaScan is a distributed passive vulnerability scanner for Web application.What NagaScan doNagaScan currently support some common Web application vulnerabilities, e.g. XSS, SQL...
View ArticleHardentools - Utility that disables a number of risky Windows features
Hardentools is a collection of simple utilities designed to disable a number of "features" exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features,...
View ArticleProwler - Tool for AWS Security Assessment, Auditing And Hardening
Tool based on AWS-CLI commands for AWS account security assessment and hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark 1.1FeaturesIt covers hardening and security...
View ArticleSamplicator - Send copies of (UDP) datagrams to multiple receivers, with...
This small program receives UDP datagrams on a given port, and resends those datagrams to a specified set of receivers. In addition, a sampling divisor N may be specified individually for each...
View ArticleHash Buster - A Script Which Scraps Online Hash Crackers to Find Cleartext of...
Hash Buster is a python script which uses several online hash crackers to find the clear text of a hash in less than 5 seconds.Features of Hash Buster:Detects hashMD5 SupportSHA1 SupportSHA2...
View ArticleEternal - An internet scanner for Eternal Blue [exploit CVE-2017-0144]
Eternal scanner is a network scanner for Eternal Blue exploit CVE-2017-0144.Requirementsmasscanmetasploit-frameworkHow to Installgit clone https://github.com/peterpt/eternal_scanner.gitcd...
View Articlemaltran - Tool To Download Malware Exercises From MALware-TRaffic-ANalysis.net
This tool was developed with the purpose of furthering and organizing access to traffic analysis exercises and malware files captured and published almost daily. Maltran makes the views and downloads...
View ArticleReconDog - An All In One Tool For All Your Basic Information Gathering Needs
Recon Dog is an all in one tool for all your basic information gathering needs. It uses APIs to gather all the information so your identity is not exposed.Downloading and running Recon DogEnter the...
View ArticleWebVulScan - Web Application Vulnerability Scanner
WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or local, web applications for security vulnerabilities. As a scan...
View ArticleHoneypotBuster - Microsoft PowerShell Module to Find HoneyPots and...
Microsoft PowerShell module designed for red teams that can be used to find honeypots and honeytokens in the network or at the host.CodeExecutionExecute code on a target machine using...
View ArticleHydra 8.6 - Fast and Flexible Network Login Hacker
A very fast network logon cracker which supports many different services.See feature sets and services coverage page - incl. a speed comparison against ncrack and Medusa. Number one of the biggest...
View Articleinforfinder - Tool To Collect Information Of Any Domains Pointing At Some...
Inforfinder is a tool made to collect information of any domain pointing at a server (ip,domain,range,file).Requires python libs: pyRequests and pyDNS-First, you need to install complementary...
View ArticleWSSAT - Web Service Security Assessment Tool
WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing its configuration files. This tool accepts WSDL...
View ArticleDAws - Advanced Web Shell
There's multiple things that makes DAws better than every Web Shell out there:Bypasses Security Systems(IPS, WAFs,etc) like Suhosin(uses up to 20 php functions just to get a command executed).Drops CGI...
View ArticleASTo - An IoT Network Security Analysis Tool and Visualizer
ASTo is security analysis tool for IoT networks. It is developed to support the Apparatus security framework. ASTo is based on electron and cytoscape.js. The icons are provided by Google's Material...
View Article