Multitor - Create Multiple TOR Instances With Load Balancing
A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy. It's provides one single endpoint for clients. In addition, you can view previously running TOR...
View ArticleIBM - Adversarial Robustness Toolbox
This is a library dedicated to adversarial machine learning. Its purpose is to allow rapid crafting and analysis of attacks and defense methods for machine learning models. The Adversarial Robustness...
View ArticleDARKSURGEON - Windows packer project to empower IR, Forensics, Malware...
DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.DARKSURGEON has three stated goals:Accelerate incident response, digital...
View ArticleGpredict - Satellite Tracking Application
Gpredict is a real-time satellite tracking and orbit prediction application. It can track a large number of satellites and display their position and other data in lists, tables, maps, and polar plots...
View ArticleBadMod v2.0 - Detect Website CMS, Website Scanner & Auto Exploiter
Auto exploiter & get all server sites & bing dorker.Version 2.0Fixed colors bugFixed permissions bugAdded new option to scan single targetAdded new option to scan joomla & wordpress...
View ArticleMsploitego - Pentesting Suite For Maltego Based On Data In A Metasploit Database
msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even...
View ArticleSleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Points
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque...
View ArticleJava Tutorial for Complete Beginners {FREE}
Learn to program using the Java programming languageRequirementsBasic fluency with computersDescriptionLearn to program in the Java programming language. This course assumes no prior programming...
View ArticleDeep Exploit - Fully automatic penetration test tool using Machine Learning ðŸ§
Deep Exploit at Black Hat USA 2018 Arsenal. DeepExploit is fully automated penetration test tool linked with Metasploit.It has two exploitation modes. Intelligence modeDeepExploit identifies the...
View ArticleAirbash - Fully automated WPA PSK handshake capture script aimed at pen-testing
Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and...
View ArticleDejaVU - Open Source Deception Framework
Deception techniques if deployed well can be very effective for organizations to improve network defense and can be a useful arsenal for blue teams to detect attacks at very early stage of cyber kill...
View ArticleAntidetect 2018 Pro OpenSource
 Hardware:Spoof Device ID, Vendor Id/ Fake Device ID, Vendor IdSpoof BIOS manufacturer, version, date etc./ Fake BIOS manufacturer, version, date etc.Spoof ACPI tables values/ Fake ACPI tables...
View ArticlePhoton - Incredibly fast crawler which extracts urls, emails, files, website...
Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target.160 requests per second while extensive data extraction is just another day for...
View ArticleBYOB - Build Your Own Botnet
Disclaimer: This project should be used for authorized testing or educational purposes only.BYOB is an open-source project that provides a framework for security researchers and developers to build and...
View ArticleSandmap - Network and system reconnaissance
Sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many...
View ArticleTurkish municipality hacked: The hackers sent SMS messages to the people...
A group calling itself the AriHackTeam hacked a Turkish municipality and sent an SMS in its name commemorating a violent act perpetrated by the Kurdistan Workers’ Party (PKK), an outlawed armed group...
View ArticleRemarkable Security Vulnerabilities and Malware Attacks
Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way...
View ArticleSecurity update for apache2 (moderate)
This update for apache2 fixes the following issues:The following security vulnerabilities were fixed:CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denialof service via specially...
View ArticleHacker Discloses Unpatched Windows Zero-Day Vulnerability
A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft's Windows operating system that could help a local user or malicious program...
View ArticleSingularity - DNS rebinding attack framework
Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name to the target machine's IP address and to...
View Article