TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR
TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.Tor...
View ArticleSeccubus- Easy Automated Vulnerability Scanning, Reporting And Analysis
Seccubus- Easy Automated Vulnerability Scanning, Reporting And AnalysisSeccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output,...
View ArticleLearn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time - eBook
"Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time"Learn how to hack systems like black hat hackers and secure them like security experts.This eBook will help you:Understand...
View ArticlePyshark- To Allowing Python Packet Parsing Using Wireshark Dissectors
Python wrapper for tshark, allowing python packet parsing using Wireshark dissectors.Pyshark features a few "Capture" objects (Live, Remote, File, InMem). Each of those files read from their respective...
View ArticleRedGhost - Linux Post Exploitation Framework
RedGhost- Linux post exploitation framework It designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. PayloadsFunction to generate various encoded...
View ArticleiKy OSINT Project - To Collect Information From E-Mail With GUI
iky OSINT Project. Collect information from a mail. Gather, Profile, Timeline.Project iKy is to collects information from an email and shows results in a nice visual interface.InstallationClone...
View ArticleMemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory
MemGuard- Secure Software Enclave For Storage of Sensitive Information in MemoryThis package attempts to reduce the likelihood of sensitive data being exposed. It supports all major operating systems...
View ArticleUSBRIP- Simple Command Live Forensic Tool For Tracking USB device
Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics...
View ArticleThe Ultimate WinRM Shell For Penetration Testing
This shell is the ultimate WinRM shell for hacking/pentesting.WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows...
View ArticleCloudCheck- To Test String If A Cloudflare DNS Bypass is Possible
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before...
View ArticlePhantom Tap (PhanTap) - An ‘Invisible’ Network Tap
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams.With limited physical access to a target building, this tap can be installed inline between a network device and the corporate...
View ArticlePowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub- A Post Exploitation Suite To Bypass Endpoint ProtectionPowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged...
View ArticleSlurp- To Security Audits of S3 Buckets Enumerator
Slurp- Blackbox/Whitebox S3 Bucket EnumeratorTo Evaluate the security of S3 bucketsOverviewCredit to all the vendor packages to develop Slurp possible.Slurp is for pen-testers and security...
View ArticleBurp Suite Extension - To Monitor And Keep Track of Tested Endpoints
Burp Scope Monitor ExtensionA Burp Suite Extension to monitor and keep track of tested endpoints.Main FeaturesSimple, easy way to keep track of unique endpoints when testing an applicationMark...
View ArticleFindomain- Fastest And Cross-platform Subdomain Enumerator
FinDomain- Fastest And Cross-platform Subdomain Enumerator.ComparisonIt comparison gives you a idea why you should use findomain instead of another enumerators. The domain used for the test was...
View ArticlePostShell - Post Exploitation Bind/Backconnect Shell
PostShell - Post Exploitation Bind/Backconnect ShellPostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job...
View ArticleDolos Cloak- For Network Penetration Testers To Automated 802.1x Bypass
Dolos Cloak- Automated 802.1x BypassDolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle attack.The...
View ArticlePenta- Open Source All-in-one CLI To Automate Pentesting
Penta (PENTest + Automation tool) is Pentest automation tool using Python3.InstallationInstall requirementspenta requires the following packages.Python3.7pipenvResolve python package dependency.$...
View ArticleTraXSS - Automated XSS Vulnerability Scanner
Automated Vulnerability Scanner for XSS Written in Python3 Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and multiple...
View ArticleHacking for Dummies, 6th Edition ($29.99 Value) Free
"Hacking for Dummies, 6th Edition ($29.99 Value) Free for a Limited Time"Stop hackers before they hack you!In order to outsmart a would-be hacker, you need to get into the hacker’s mindset and with...
View ArticleXRay - Using For Recon Mapping And OSINT Suite
XRay is a software for recon, mapping and OSINT gathering from public networks.XRay for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network...
View ArticleBest Practices For Protecting Against Phishing, Ransomware and Email Fraud
"Best Practices for Protecting Against Phishing, Ransomware and Email Fraud"Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those...
View ArticleCybersecurity- The Beginner's Guide ($29.99 Value) FREE For a Limited Time
"Cybersecurity: The Beginner's Guide ($29.99 Value) FREE For a Limited Time".Understand the nitty-gritty of Cybersecurity with easeIt's not a secret that there is a huge talent gap in the cybersecurity...
View ArticleSmart OSINT Collection of Common IOC Types
Smart OSINT Collection of Common IOC (Indicator of compromise) TypesThis application is designed to assist security analysts and researchers with the collection and assessment of common IOC types....
View ArticleWeb Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a...
"Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Time"Peak the languages that power the web.With more high-paying web development jobs opening every day, people with...
View Article