JadedWraith : Light-weight UNIX Backdoor

4 years ago

JadedWraith is a Lightweight UNIX backdoor for ethical hacking. Useful for red team engagements and CTFs. Something I wrote a…

QueenoSno : Golang Binary For Data Exfiltration With ICMP Protocol

4 years ago

QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been…

PoW-Shield : Project Dedicated To Fight DDoS And Spam With Proof Of Work, Featuring An Additional WA

4 years ago

PoW-Shield provides DDoS protection on OSI application layer by acting as a proxy that utilizes proof of work between the…

Linux VPN Software – 3 Decent Options

4 years ago

All users connect via a VPN whenever accessing public Wi-Fi connections, especially when sending personal information over an insecure network.…

Haklistgen : Turns Any Junk Text Into A Usable Wordlist For Brute-Forcing

4 years ago

Haklistgen turns any junk text into a usable wordlist for brute-forcing. Installation go install github.com/hakluke/haklistgen@latest Usage Examples Scrape all words…

Reconky : A Great Content Discovery Bash Script For Bug Bounty Hunters Which Automate Lot Of Task And Organized It

4 years ago

Reconky is a script written in bash to automate the task of recon and information gathering. This Bash Script allows…

Wordlistgen : Quickly Generate Context-Specific Wordlists For Content Discovery From Lists Of URLs Or Paths

4 years ago

Wordlistgen is a tool to pass a list of URLs and get back a list of relevant words for your…

AES256_Passwd_Store : Secure Open-Source Password Manager

4 years ago

AES256_Passwd_Store script securely encrypts or decrypts passwords on disk within a custom database file. It also features functionality to retrieve…

DirSearch : A Go Implementation Of Dirsearch

4 years ago

DirSearch software is a Go implementation of the original dirsearch tool written by Mauro Soria. DirSearch is the very first tool I write…