TorWall - Transparent Tor for Windows
Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also...
View ArticleNzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup...
Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a...
View ArticleWebBreaker - Dynamic Application Security Test Orchestration (DASTO)
Build functional security testing, into your software development and release cycles! WebBreaker provides the capabilities to automate and centrally manage Dynamic Application Security Testing (DAST)...
View ArticleVanquish - Kali Linux based Enumeration Orchestrator
Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results...
View ArticleWfuzz - Web Application Fuzzer
Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.A...
View ArticleAWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets
AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It's similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow...
View ArticleBlisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
A slow data siphon for MySQL/MariaDB using bitwise operation on printable ASCII characters, via a blind-SQL injection.UsageUSAGE:blisqy.py --server <Web Server> --port <port> --header...
View ArticleNIELD v0.6.1 - Network Interface Events Logging Daemon
NIELD (Network Interface Events Logging Daemon) is a tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache (ARP,NDP), IP address...
View ArticleOSXAuditor - Free Mac OS X Computer Forensics Tool
OS X Auditor is a free Mac OS X computer forensics tool.OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:the kernel extensionsthe...
View ArticleRHAPIS - Network Intrusion Detection Systems Simulator
Network intrusion detection systems simulator. RHAPIS provides a simulation environment through which user is able to execute any IDS operation.Basic UsageType HELP in the console in order to see the...
View ArticleBreacher - Tool To Find Admin Login Pages And EAR Vulnerabilites
A script to find admin login pages and EAR vulnerabilites.FeaturesMulti-threading on demandBig path list (798 paths)Supports php, asp and html extensionsChecks for potential EAR vulnerabilitesChecks...
View Articlepsad - Intrusion Detection and Log Analysis with iptables
The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans...
View ArticleFLOSS - FireEye Labs Obfuscated String Solver (Automatically extract...
Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of an executable. Often, these portions are strings and...
View ArticleCameradar v2.0 - Hack into RTSP CCTV cameras
An RTSP stream access tool that comes with its library.Cameradar allows you toDetect open RTSP hosts on any accessible target hostDetect which device model is streamingLaunch automated dictionary...
View ArticleVHostScan - Virtual Host Scanner
A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck).Key...
View Articledrinkme - Shellcode Testing Harness
drinkme is a shellcode test harness. It reads shellcode from stdin and executes it. This allows pentesters to quickly test their payloads before deployment.Formatsdrinkme can handle shellcode in the...
View ArticleDET - (extensible) Data Exfiltration Toolkit
DET (is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time.This is a Proof of Concept aimed at identifying possible DLP...
View ArticleAnti-DDOS - Anti DDOS Bash Script
Programming Languages :BASHRUNroot@ismailtasdelen:~# bash ./anti-ddos.shCloning an Existing Repository ( Clone with HTTPS )git clone https://github.com/ismailtasdelen/Anti-DDOS.gitCloning an Existing...
View ArticleACLight - PowerShell Script for Advanced Discovery of Privileged Accounts...
ACLight is a tool for discovering privileged accounts through advanced ACLs (Access Lists) analysis. It includes the discovery of Shadow Admins in the scanned network.The tool queries the Active...
View ArticlePowerSAP - Powershell SAP Assessment Tool
PowerSAP is a simple powershell re-implementation of popular & effective techniques of all public tools such as Bizploit, Metasploit auxiliary modules, or python scripts available on the Internet....
View Article