WPCracker – WordPress User Enumeration And Login Brute Force Tool
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control...
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control...
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency....
It goes without saying that the 117th US Congress has a lot to get done and many legitimate priorities are...
This is a simple script intended to perform a full recon on an objective with multiple subdomains tl;drRequires Go Run...
A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting WeaponsOSTypeNameDescriptionAllAnalysisRMS-Runtime-Mobile-SecurityRuntime Mobile Security (RMS) - is a...
Purchasing software through AWS Marketplace has to be one of the most under-appreciated perks of being an Amazon Web Services...
A tool to hunt for credentials in the GitHub wild AKA git*huntGetting startedInstall the tool Configure your GitHub token Search...
HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless...
LEQL Multi-groupby in InsightIDRFor a look at the most up-to-date list of Log Search capabilities, check out our help documentation...
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial...
Collect OSINT for GitLab groups and members and search the group and group members' snippets, issues, and issue discussions for...
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. FeaturesFeatureful...
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc... Check Documentation for...
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are...
ByteDance-HIDS is a Cloud-Native Host-Based Intrusion Detection solution project to provide next-generation Threat Detection and Behavior Audition with modern architecture....
ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 Replace...
stegbrute is a fast steganography brute force tool written in Rust using also threads to achieve a faster executionDependenciesStegbrute cannot...
PINEAPPLE MK7 REST CLIENTThe leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks...
(pronounced: "kay fifty-five") The K55 payload injection tool is used for injecting x86_64 shellcode payloads into running processes. The utility...
Umbrella is an Android mobile app developed by Security First that provides human rights defenders with the information on what...
A tool made for specially scanning nearby devices and execute our given command on our system when the target device...
We arrive at the first Patch Tuesday of 2021 (2021-Jan) with 83 vulnerabilities across our standard spread of products. Windows...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in...
sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.UsageTo display...