PassMute – PassMute – A Multi Featured Password Transmutation/Mutator Tool
This is a command-line tool written in Python that applies one or more transmutation rules to a given password or...
This is a command-line tool written in Python that applies one or more transmutation rules to a given password or...
Written by TMRSWRR Version 1.0.0 All in one tools for LFI VULN FINDER -LFI DORK FINDER Instagram: TMRSWRR Screenshots How...
TLDHunt is a command-line tool designed to help users find available domain names for their online projects or businesses. By...
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files. Done Related domains, IPs collect...
An advance cross-platform and multi-feature GUI web spider/crawler for cyber security proffesionals. Spider Suite can be used for attack surface...
OWASP Global AppSec Dublin - talk and demo Features scan Amazon Route53 across an AWS Organization for domain records vulnerable...
About Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in...
NTLMRecon is a Golang version of the original NTLMRecon utility written by Sachin Kamath (AKA pwnfoo). NTLMRecon can be leveraged...
Fuzztruction is an academic prototype of a fuzzer that does not directly mutate inputs (as most fuzzers do) but instead...
Why "Spartacus"? If you have seen the film Spartacus from 1960, you will remember the scene where the Romans are...
teler-waf is a comprehensive security solution for Go-based web applications. It acts as an HTTP middleware, providing an easy-to-use interface...
Secure Your API. Metlo is an open-source API security platform With Metlo you can: Create an Inventory of all your...
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications. It can...
A Linux Bash script to discover the netblocks, or ranges, (in CIDR notation) owned by the target organization during the...
Signing-key abuse and update exploitation framework. % docker run -it --rm ghcr.io/kpcyrd/sh4d0wup:edge -hUsage: sh4d0wup <COMMAND>Commands: bait Start a malicious update...
Discover, filter, and prioritize security risks and vulnerabilities impacting your code. Bearer is a static application security testing (SAST) tool...
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for...
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework. Complete...
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness,...
CIS Benchmark testing of Windows SIEM configuration This is an application for testing the configuration of Windows Audit Policy settings...
KubeStalk is a tool to discover Kubernetes and related infrastructure based attack surface from a black-box perspective. This tool...
Nuclear Pond is used to leverage Nuclei in the cloud with unremarkable speed, flexibility, and perform internet wide scans for...
This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file...
Striker is a simple Command and Control (C2) program. Disclaimer This project is under active development. Most of the features...