Arsenal – Recon Tool Installer

3 years ago

Arsenal is a Simple shell script (Bash) used to install the most important tools and requirements for your environment and…

Erlik 2 : Vulnerable Flask App

3 years ago

Erlik 2 is a vulnerable Flask Web App. It is a lab environment created for people who want to improve…

Utkuici – Nessus Automation

3 years ago

Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great…

Java-Remote-Class-Loader : Tool To Send Java Bytecode Victims To Load & Execute

3 years ago

Java-Remote-Class-Loader is a tool that allows you to send Java bytecode in the form of class files to your clients…

Bayanay – Python Wardriving Tool

3 years ago

Bayanay is a Python Wardriving tool. WarDriving is the act of navigating, on foot or by car, to discover wireless…

Deadfinder – Find Dead-Links (Broken Links)

3 years ago

Dead link (broken link) means a link within a web page that cannot be connected. These links can have a…

Pmanager – Store And Retrieve Your Passwords From A Secure Offline Database

3 years ago

PManager Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent…

TestSSL.SH : Testing TLS/SSL Encryption Anywhere On Any Port

3 years ago

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers,…

Lunar : UNIX Security Auditing Tool

3 years ago

lunar, Lockdown UNix Auditing and Reporting Version Current version 8.0.5 Refer to lunar.sh and changelog for more up to date…

Psudohash : Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns

3 years ago

psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by…