AMSI-Bypass-HWBP : A Tool For Evading AMSI Detection

3 weeks ago

AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware by scanning scripts and files…

BurpSuite-Xkeys : Mastering Key And Token Extraction For Web Security

3 weeks ago

Xkeys is a Burp Suite extension designed to extract interesting strings such as keys, secrets, and tokens from web pages.…

DEDSEC_BOTNET : A Comprehensive Tool For Penetration Testing And Ethical Hacking

3 weeks ago

DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is intended for use in penetration…

JS Snitch : Hidden Secrets In JavaScript Files

3 weeks ago

JS Snitch is a powerful command-line tool designed to scan remote JavaScript files for potential secrets or credentials. It leverages…

RunAs-Stealer : A Credential Stealing Tool

3 weeks ago

RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart…

IDOR Scanner : A Comprehensive Tool For Detecting Insecure Direct Object References

3 weeks ago

The IDOR Scanner is a powerful Burp Suite extension designed to identify potential Insecure Direct Object Reference (IDOR) vulnerabilities in…

SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool

3 weeks ago

SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug…

Mininterface : Simplifying GUI, TUI, CLI, And Config File Management

3 weeks ago

Mininterface is a powerful Python library designed to simplify the creation of user interfaces for applications. It allows developers to…

NFCGate : A Comprehensive NFC Traffic Analysis Tool

3 weeks ago

NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure…

ShellOpsLog : A Lightweight Command Logger

3 weeks ago

ShellOpsLog is a versatile tool designed to capture and log all executed commands during various operations, such as red and…