Astra – Automated Security Testing For REST API’s
REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be...
REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be...
A browser extension that encrypts your communications with many websites that offer HTTPS but still allow unencrypted connections.Getting StartedGet the...
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or...
I wrote this tool to help me testing XXE vulnerabilities.It generates the XML payloads, and automatically starts a server to...
OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If...
InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.FeaturesDownload Instagram PhotosDownload...
xShock ShellShock (CVE-2014-6271)This tool exploits shellshock.Written by Hulya KarabagVersion 1.0.0Instagram: Capture the RootScreenshotsHow to useRead MeAll founded directories will be...
We are now living in challenging times due to the COVID-19 outbreak as we work from home, self-isolate, and protect...
Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef....
As far as I know, sshuttle is the only program that solves the following common case:Your client machine (or router)...
Right now, we are all dealing with uncertain times, given the COVID-19 pandemic. The organizations we work for are depending...
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not...
Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version...
Could your team be wasting its time reporting vulnerability metrics that don’t matter? Security teams often fall into the trap...
Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent...
shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as...
Recently, we interviewed Anthony Edwards, director of security operations for Hilltop Holdings, about how his financial holdings organization approaches multi-level...
COVID-19 has created a great deal of concern and uncertainty, and we want to reassure our customers that your security...
We have rapidly entered a new era of living with a global pandemic. As a result, many are working from...
AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source
Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It...
A ssh-client worm made with tas framework.How it works?This is a fakessh-client that manipulates the tty input/output to execute arbitrary...
Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess...
Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential.Operational Usage...