Kubeclarity : Tool For Detection And Management Of Software Bill Of Materials

3 years ago

KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and…

SSOh-No : User Enumeration And Password Spraying Tool For Testing Azure AD

3 years ago

SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD…

AutoResponder : Carbon Black Response IR Tool

3 years ago

AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the help of Carbon…

Spring4Shell-POC : Dockerized Spring4Shell (CVE-2022-22965) PoC Application And Exploit

3 years ago

Spring4Shell-POC is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is…

CVE-Tracker : With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs

3 years ago

CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this…

GoSH : Golang Reverse/Bind Shell Generator

3 years ago

GoSH is a tool that generates a Go binary that launches a shell of the desired type on the targeted…

Email-Prediction-Asterisks : Script That Allows You To Identify The Emails Hidden Behind Asterisks

3 years ago

Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application…

PEzor-Docker : With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!

3 years ago

PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of…

Graphql-Threat-Matrix : GraphQL Threat Framework Used By Security Professionals

3 years ago

graphql-threat-matrix was built for bug bounty hunters, security researchers and hackers to assist with uncovering vulnerabilities across multiple GraphQL implementations. The…

Malicious-Pdf : Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality

3 years ago

Malicious-Pdf Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration testing and/or…