R3con1z3r- A Lightweight Web Information Gathering Tool
R3con1z3r is a lightweight Web Information Gathering tool with an intuitive features written in python. It provides a powerful environment in which open source intelligence (OSINT) web-based...
View ArticleEthr- A Network Performance Measurement Tool For TCP, UDP And HTTP
Ethr- A Network Performance Measurement Tool For TCP, UDP And HTTPEthr is a cross platform network performance measurement tool written in golang. The goal of this project is to provide a native tool...
View ArticleSpiderFoot- An Open Source Intelligence (OSINT) Automation Tool
SpiderFoot- An Open Source Intelligence (OSINT) Automation ToolIts goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname,...
View ArticleShorewall - A Gateway/Firewall Configuration Tool for GNU/Linux
Shorewall - A Gateway/Firewall Configuration Tool for GNU/Linux.What is Shorewall?The Shoreline Firewall, more commonly known as “Shorewall”, is high-level tool for configuring Netfilter. You describe...
View ArticleBypass Firewalls By DNS History
Bypass Firewalls By Abusing DNS HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for...
View ArticleAdvanced Penetration Testing - Hacking the World Most Secure Networks ($26...
Advanced Penetration Testing - Hacking the World's Most Secure Networks ($26 Value) FREE For a Limited Time"This resource takes hacking far beyond Kali Linux and Metasploit to provide a more complex...
View ArticleHexyl- A Command-line Hex Viewer
Hexyl- A Command-line Hex Viewerhexyl is a simple hex viewer for the terminal. It uses a colored output to distinguish different categories of bytes (NULL bytes, printable ASCII characters, ASCII...
View ArticleSitadel- A Web Application Security Scanner
Sitadel- A Web Application Security ScannerSitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new modules and implement new...
View ArticleSh00t- A Penetration Testing Environment For Manual Security Testers
It is a task manager to let you focus on performing security testing.Provides To Do checklists of test cases.Helps to create bug reports with customization bug templates.Security Testing is not as...
View ArticleADAPT- Automated Dynamic Application Penetration Testing For WebApps
ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed, and confidence in penetration testing efforts.ADAPT...
View ArticleMastering Linux Security And Hardening ($23 Value) FREE For a Limited Time
"Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time"A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.This book has extensive...
View Articlefwknop- Single Packet Authorization - Port Knocking
fwknop- Single Packet Authorization (SPA)fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which is...
View ArticleGoScan - An Interactive Network Scanner
GoScan- An Interactive Network ScannerGoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap.GoScan can now be used to perform...
View ArticleDFIRTrack - Digital Forensics And Incident Response Tracking Application
DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend.In contrast to other great incident...
View ArticleNapper- A Trusted Platform Module (TPM) Vulnerability Checker
"Napper"- A Trusted Platform Module (TPM) Vulnerability Checker ToolTPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019"Napper" is a new checking tool...
View ArticleSSRFMap - Automatic SSRF Fuzzer And Exploitation Tool
SSRFMap - Automatic SSRF Fuzzer and Exploitation ToolSSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp...
View ArticleVenom - A Multi-hop Proxy For Penetration Testers
Venom is a multi-hop proxy tool developed for penetration testers using Go.You can use venom to easily proxy network traffic to a multi-layer intranet, and easily manage intranet nodes.Featuresnetwork...
View ArticleThe Cyber Risk Handbook - Creating and Measuring Effective Cybersecurity...
"The Cyber Risk Handbook - Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For a Limited Time"This resource is the practitioner's guide to implementing, measuring and...
View ArticleCMSEEK- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal...
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and 150 other CMSs What is CMS?A content management system (CMS) manages the creation and modification of digital content. It...
View ArticleVita- Simple And Fast VPN Gateway
Vita- Simple And Fast VPN GatewayVita is a high-performance L3 VPN gateway you can use to interconnect your networks. Vita acts as a tunnel between your local, private network and any number of remote...
View Article