SMBeagle : Fileshare Auditing Tool That Hunts Out All Files It Can See In The Network And Reports If The File Can Be Read And/Or Written

4 years ago

SMBeagle is an (SMB) file share auditing tool that hunts out all files it can see in the network and…

Fileless-Xec : Stealth Dropper Executing Remote Binaries Without Dropping Them On Disk

4 years ago

Fileless-Xec is a Stealth Dropper Executing Remote Binaries Without Dropping Them On Disk Pentest use: fileless-xec is used on target machine to…

Infrastructure-as-Code (IaC) Management in the Cloud

4 years ago

One of the most critical and vital components today, in the Cloud era, is the Infrastructure as Code (IaC). In…

Kali Intelligence Suite : Shall Aid In The Fast, Autonomous, Central, And Comprehensive Collection Of Intelligence By Executing Standard Penetration Testing Tools

4 years ago

Kali Intelligence Suite (KIS) is an intelligence gathering and data mining tool for penetration testers. It shall aid in the…

Swurg : Parse OpenAPI Documents Into Burp Suite For Automating OpenAPI-based APIs Security Assessments

4 years ago

Swurg is a Burp Suite extension designed for OpenAPI testing. The OpenAPI Specification (OAS) defines a standard, programming language-agnostic interface…

STEWS : A Security Tool For Enumerating Web Sockets

4 years ago

STEWS is a tool suite for security testing of Web Sockets This research was first presented at OWASP Global AppSec US…

Toutatis : A Tool That Allows You To Extract Information From Instagram Accounts Such As E-Mails, Phone Numbers And More

4 years ago

Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and moreFor…

Forbidden : Bypass 4Xx HTTP Response Status Codes

4 years ago

Forbidden is to Bypass 4xx HTTP response status codes. Based on PycURL. Script uses multithreading, and is based on brute forcing…

AirStrike : Automatically Grab And Crack WPA-2 Handshakes With Distributed Client-Server Architecture

4 years ago

AirStrike is a tool that automates cracking of WPA-2 Wi-Fi credentials using client-server architecture. Requirements Airstrike uses Hashcat Brain Architecture, aircrack-ng suite, entr utility…

IAM Vulnerable : Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground

4 years ago

IAM Vulnerable is to use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.. IAM Vulnerable uses the…