DefenseMatrix - Full security solution for Linux Servers
DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a Linux server faster and easier.Never before have a...
View ArticlePharos - Automated static analysis tools for binary programs
The Pharos static binary analysis framework is a project of the Software Engineering Institute at Carnegie Mellon University. The framework is designed to facilitate the automated analysis of binary...
View Articleoutis - custom Remote Administration Tool
outis is a custom Remote Administration Tool (RAT) or something like that. Think Meterpreter or Empire-Agent. However, the focus of this tool is neither an exploit toolkit (there are no exploits) nor...
View ArticleHackSys Extreme Vulnerable Driver
HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level.HackSys Extreme Vulnerable...
View ArticleMetasploit In Termux
TERMUXTermux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are...
View ArticleIntrigue-core - Framework for automated attack surface discovery
Intrigue makes it easy to discover information about attack surface connected to the Internet. Intrigue utilizes common sources of OSINT via “tasks” to create “entities”. Each discovered entity can be...
View Articledcrawl - Multi-threaded Web Crawler
dcrawl is a simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.dcrawl takes one site URL as input and detects all <a href=...> links in the...
View ArticleOWASP ZSC - Shellcode/Obfuscate Code Generator
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under...
View ArticleSeth - RDP Man in the Middle Attack Tool
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate...
View ArticleAWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets
AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It's similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow...
View ArticleBitCracker - Bitlocker password cracker
BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password cracking tool for memory units encrypted...
View ArticlerVMI - A New Paradigm For Full System Analysis
rVMI is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel...
View ArticleHijacker - Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for...
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a...
View ArticleZeus-Scanner - Advanced dork searching utility
Zeus is a advanced dork searching tool that is capable of bypassing search engine API calls, search engine captchas, and IP address blocking from sending many requests to the search engine itself. Zeus...
View Articleflashlight - Automated Information Gathering Tool for Penetration Testers
Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather information rapidly on target networks. So Flashlight should be...
View ArticleDefploreX - MACHINE-LEARNING TOOLKIT FOR LARGE-SCALE ECRIME FORENSICS
At BlackHat USA 2017's Arsenal we've showcased DefPloreX, an Elasticsearch-based toolkit that our team uses for large-scale processing, analysis and visualization of e-crime records. In particular,...
View ArticleProcInfo - Process info/monitoring library for macOS
Proc Info is a open-source, user-mode, library for macOS. It provides simple interface to retrieve detailed information about running processes, plus allows one to asynchronously monitor process...
View ArticleLuLu - macOS firewall
LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user:Full details and usage instructions can be found here.To...
View ArticleAPT2 - An Automated Penetration Testing Toolkit
This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will be used to launch exploit and enumeration modules according to the...
View ArticleShinoBOT - RAT / Botnet Simulator for pentest / education
ShinoBOT, is a executable which is a RAT(Remote Access Trojan) simulator. You can remote-control your infected machine from the ShinoC2 (C&C server). You can execute any Windows commands,...
View Article