Hash-Buster v3.0 is a tool to Crack Hashes In Seconds. Features Automatic hash type identificationSupports MD5, SHA1, SHA256, SHA384, SHA512Can…
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like…
Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec…
Modern-day communication technology is one of the most advanced and influential inventionsto affect humanity. However, it does have a dark…
Despite major cyber-attacks making headlines every month or so, several businesses are far behind the curve when it comes to…
Orbitaldump is a simple multi-threaded distributed SSH brute-forcing tool written in Python. When the script is executed without the --proxies switch, it…
ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of…
JWTweak is a tool to detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT…
DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS records, it uses different…
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow…