Monday, January 27, 2020

Trending Tools

Yarasafe : SAFE Embeddings To Match Functions In Yara

Yarasafe : SAFE Embeddings To Match Functions In Yara

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding developed by...
How to Protect Yourself Against Common Password Attacks

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the near future....
AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework for automatic...
TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions, tas_execv, tas_forkpty,...
Corsy : CORS Misconfiguration Scanner

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.
TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install &...
Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find security-related misconfigurations...
Gophish : Open-Source Phishing Toolkit

Gophish : Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily...
Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j. This...
Scallion : GPU-Based Onion Hash Generator

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono (tested in...
5,000FollowersFollow

Most Used

Important tools

Kali Linux Tools

The blog covers kali linux tools right from the developers including detailed explanation on how to use the tools to perform a penetration testing. We covers various tools that to be used with various operating systems.