Hash-Buster v3.0 : Crack Hashes In Seconds

4 years ago

Hash-Buster v3.0 is a tool to Crack Hashes In Seconds. Features Automatic hash type identificationSupports MD5, SHA1, SHA256, SHA384, SHA512Can…

Allsafe : Intentionally Vulnerable Android Application

4 years ago

Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like…

Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)

4 years ago

Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec…

Cyberstalkers: How to Protect Yourself

4 years ago

Modern-day communication technology is one of the most advanced and influential inventionsto affect humanity. However, it does have a dark…

Data Breaches Aren’t Going Away: Everything You Need to Know to Protect Your Business

4 years ago

Despite major cyber-attacks making headlines every month or so, several businesses are far behind the curve when it comes to…

Orbitaldump : A Simple Multi-Threaded Distributed SSH Brute-Forcing Tool Written In Python

4 years ago

Orbitaldump is a simple multi-threaded distributed SSH brute-forcing tool written in Python. When the script is executed without the --proxies switch, it…

ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data.

4 years ago

ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of…

JWTweak : Detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT Token Based On The User Selected Algorithm

4 years ago

JWTweak is a tool to detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT…

DNSrr : A Tool Written In Bash, Used To Enumerate All The Juicy Stuff From DNS

4 years ago

DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS records, it uses different…

Whisker : A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute

4 years ago

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow…