Inspeckage - (Android Package Inspector) Dynamic Analysis With Api Hooks,...
Inspeckage is a tool developed to offer dynamic analysis of Android applications. By applying hooks to functions of the Android API, Inspeckage will help you understand what an Android application is...
View ArticleLeviathan - Wide Range Mass Audit Toolkit
Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan,...
View ArticleMail Tool v1.2 - E-mail spoofing tool
Email Tool works on Windows and Linux via Wine.This tool is standalone and doesn't require you to have Python anymore. Uses Gmail SMTP, supports attachments and HTML. Make sure to enable access for...
View ArticleNIPE - Redirect all traffic to TOR
Nipe is a script to make Tor Network your default gateway.The nipe is a tool written in Perl Script, it use the Tor project and iptables, to create routing rules, forcing all traffic to pass in the Tor...
View ArticleSecurity Ninjas: An Open Source Application Security Training Program
Security NinjasIn order for OpenDNS to be able to make the internet secure, we need to make sure OpenDNS itself is secure. On the Application Security front, apart from performing security reviews, we...
View ArticleTurkish authorities block Wikipedia without giving reason
Turkey has blocked online encyclopedia Wikipedia, the telecommunications watchdog said on Saturday, citing a law allowing it to ban access to websites deemed obscene or a threat to national...
View ArticleSource Code for CIA’s Tool to Track Whistleblowers Leaked by Wikileaks
Wikileaks has just published a new batch of the Vault 7 leak, exposing the documentation and source code for a CIA project known as "Scribbles."Scribbles, a.k.a. the "Snowden Stopper," is a piece of...
View ArticleNodeJS Web Exploit Detector
The Web Exploit Detector is a Node.js application (and NPM module) used to detect possible infections, malicious code and suspicious files in web hosting environments. This application is intended to...
View ArticlePowerStager - PowerShell payload generator
This script creates an executable stager that downloads a selected powershell payload, loads it into memory and executes it using obfuscated EC methods. The script will also encrypt the stager for...
View ArticleMobile Security Framework (MobSF)
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS/Windows) automated pen-testing framework capable of performing static and dynamic analysis....
View ArticleEvilginx - Advanced Phishing with Two-factor Authentication Bypass
Attacker generates a phishing link pointing to his server running Evilginx Parameters in the URL stand for: rc = On successful sign-in, victim will be redirected to this link e.g. document hosted on...
View ArticleNoriben - Portable, Simple, Malware Analysis Sandbox
Noriben is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware. In a nutshell, it allows you to run...
View ArticleTinfoleak v2.0 - Get detailed information about a Twitter user activity
Are you interested in OSINT tools? Tinfoleak is the best OSINT tool for Twitter, and is open-source!The new version includes a lot of new and improved features:Search by coordinatesGeolocated...
View ArticleUnix Privilege Escalation Exploits Pack
Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc. If anyone is willing to work with me and organize this better, it will be helpful to many...GITHUB DOWNLOAD
View ArticleThe best female coders belong to these 10 countries
While computer coding, programming, software and hardware, is always predominantly considered a field to be swarmed by males, there were many women who were bold enough to choose these fields and make...
View ArticleXortool - A Tool To Analyze Multi-byte XOR Cipher
Xortool is a python tool that allows you to analyze multi-byte xor cipher and guess the xor key (based on count of equal chars) and the key length (base on knowledge of most frequent char).Note:...
View ArticleARPwner - ARP & DNS Poisoning Attack Tool
ARPwner is a python tool that allows you to perform ARP poisoning and DNS poisoning attacks. It has a clean and simple GUI and a plugin system to do filtering of the information gathered, and also has...
View ArticlePwnPi - A Pen-testing Drop Box Distribution For Raspberry Pi
PwnPi is a Linux-based penetration testing drop box distribution for the Raspberry Pi. It currently has 200+ security tools pre-installed to aid the penetration tester. It is built a stripped down...
View ArticleTCHead - TrueCrypt Password Cracking Tool
I know TrueCrypt is outdated, and no one is using it anymore. But if you find someone who is still using TrueCrypt, then the TCHead may come in handy. So let's talk about it...TCHead is a simple tool...
View ArticleThis Russian robot shoots guns
The human-like robot can lift weights, screw in light bulbs, extinguish a fire, drive jeeps, drill holes, do press-ups, shoot guns, and travel to the Moon.A Russian official posted a video on his...
View Article