Cr3dOv3r - Know the dangers of credential reuse attacks
Your best friend in credential reuse attacks.Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) :Search for public leaks for the email and if it any, it returns with all...
View ArticleMacro Creator - PowerShell VBA macro for MS-Word
Invoke-MacroCreator is a powershell Cmdlet that allows for the creation of an MS-Word document embedding a VBA macro with various payload delivery and execution capabilities.DescriptionBasically the...
View ArticleDroidefense - Advance Android Malware Analysis Framework
DroidefenseĀ (originally named atom:Ā analysisĀ throughĀ observationĀ machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that...
View ArticleMerlin - HTTP/2 Command & Control server and agent
The quickest and easiest way to start using Merlin is download the pre-compiled binary files found in theĀ ReleasesĀ section. The files are compressed into 7z archives and are password protected to...
View ArticleArcherysec - Vulnerability Assessment and Management
Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform...
View ArticleRetDec - Retargetable machine-code decompiler based on LLVM
The decompiler is not limited to any particular target architecture, operating system, or executable file format:Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine...
View ArticlePiKarma - š”šš Detects wireless network attacks performed by KARMA module
Working Principle for PiKarmaCollects all the packets from Wireless Network. (Probe Response)Analyses all the packets in real time.If PiKarma finds more than one SSID info from unique mac address in...
View ArticleCloak - Backdoor any python script with some tricks
CloakĀ generates a python payload viaĀ msfvenomĀ and then intelligently injects it into the python script you specify.To evade basic detection, Cloak breaks the payload into several parts and places it in...
View ArticleBlueMaho Project - Bluetooth Security Testing Suite
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for...
View ArticleQBDI - Dynamic Binary Instrumentation framework
QuarkslaB Dynamic binary Instrumentation (QBDI) is a modular, cross-platform and cross-architecture DBI framework. It aims to support Linux, macOS, Android, iOS and Windows operating systems running on...
View ArticleACE - Automated, Collection, and Enrichment Platform
The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data. The data is collected...
View Articleuncaptcha - Defeating Google's audio reCaptcha with 85% accuracy
Defeating Google's audio reCaptcha system with 85% accuracy.Ā Across the Internet, hundreds of thousands of sites rely on Google's reCaptcha system for defense against bots (in fact, Devpost uses...
View ArticleSublist3r - Fast subdomains enumeration tool for penetration testers
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting....
View ArticleRedLogin - SSH Brute-Force Tools
Features:High speed and precisionCLI ( Console based )Run the arbitrary command after the attack is successful ( Default 'Uname -a' )Telegram messanger support for sending reports via bot...
View ArticleQubes OS - A reasonably secure operating system
Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and...
View ArticleSalamandra - Find spy microphones that use radio freq to transmit
Salamandra is a tool to detect andĀ locateĀ spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped...
View ArticleInstagram-Py - Simple Instagram brute force script written in python
Instagram-PyĀ is a simple python script to perform basicĀ brute forceĀ attack againstĀ InstagramĀ ,this script canĀ bypassĀ login limiting on wrong passwords , so basically it can testĀ infinite number of...
View ArticleDecodify - It can detect and decode encoded strings, recursively
It can detect and decode encoded strings, recursively. Its currently in beta phase.Lets take this string :Ā teamultimate.inĀ and encode it with Hex, URL, Base64 and FromChar encoding, respectively.Now...
View ArticleScout2 - Security auditing tool for AWS environments
Scout2 is an open source tool that helps assessing the security posture of AWS environments. Using the AWS API, the Scout2 Python scripts fetch CloudTrail, EC2, IAM, RDS, and S3, configuration data....
View ArticleCoffeeMiner - Collaborative (mitm) cryptocurrency mining pool in wifi networks
Collaborative (mitm) cryptocurrency mining pool in wifi networksConceptPerforms a MITM attack to all selected victimsInjects a js script in all the HTML pages requested by the victimsThe js script...
View Article