Dora : Find Exposed API Keys Based On RegEx And Get Exploitation Methods

3 years ago

Dora, a tool to Find Exposed API Keys Based On RegEx And Get Exploitation Methods For Some Of Keys That…

Lupo : Malware IOC Extractor. Debugging Module For Malware Analysis Automation

3 years ago

Lupo is a Debugging module for Malware Analysis Automation. Working on security incidents that involve malware, we come across situations…

Osinteye : Username Enumeration And Reconnaisance Suite

3 years ago

Osinteye is a tool used for Username enumeration & reconnaisance suite. Supported sites  PyPI Github TestPypi About.me Instagram DockerHub Installation Clone project: $ git clone…

Rip Raw : Small Tool To Analyse The Memory Of Compromised Linux Systems

3 years ago

Rip Raw is a small tool to analyse the memory of compromised Linux systems. It is similar in purpose to…

IOSSecuritySuite : iOS Platform Security And Anti-Tampering Swift Library

3 years ago

iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift! If you are…

BITB : Browser In The Browser (BITB) Templates

3 years ago

BITB is a Browser templates for Browser In The Browser (BITB) attack. Usage Each folder has a index.html file which has 4…

O365-Doppelganger : A Quick Handy Script To Harvest Credentials Off Of A User

3 years ago

O365-Doppelganger is NOT a replacement for hardcore phishing activities. There are several other tools which perform OAuth and OTA capture…

How Crypto Can Be Manipulated: Fake Identities in a Peer-to-Peer Model

3 years ago

Depending on who you ask, cryptocurrency is either a fantastic new era of financial regulation or a confusing mess of…

VulFi : Plugin To IDA Pro Which Can Be Used To Assist During Bug Hunting In Binaries

3 years ago

VulFi (Vulnerability Finder) tool is a plugin to IDA Pro which can be used to assist during bug hunting in…

Bore : Simple CLI Tool For Making Tunnels To Localhost

3 years ago

Bore, a modern simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection…