JWT-Hack : Hack the JWT(JSON Web Token)

4 years ago

JWT-Hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and…

ISH : Linux Shell For iOS

4 years ago

ISH is a project to get a Linux shell running on iOS, using usermode x86 emulation and syscall translation. For…

Grype : A Vulnerability Scanner For Container Images And Filesystems

4 years ago

Grype is a vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan…

Taser : Python3 Resource Library For Creating Security Related Tooling

4 years ago

TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling,…

Cobalt Strike Scan : Scan Files Or Process Memory For CobaltStrike Beacons & Parse Their Configuration

4 years ago

Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence…

Manuka : A Modular OSINT Honeypot For Blue Teamers

4 years ago

Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue…

Pesidious : Malware Mutation using Deep Reinforcement Learning & GANs

4 years ago

The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass AI…

NoSQLi : NoSql Injection CLI Tool

4 years ago

NoSQL1 is a NoSQL scanner and injector. I wanted a better nosql injection tool that was simple to use, fully…

SSJ : Linux Distribution Gone Super Saiyan

4 years ago

SSJ is a silly little script that makes use of Docker installed on your everyday Linux distribution (Ubuntu, Debian, etc.)…

Taken : Takeover AWS IPS & Have A Working POC For Subdomain Takeover

4 years ago

Taken is a tool to takeover AWS ips and have a working POC for Subdomain Takeover. Idea is simple Get…