Fawkes : Tool To Search For Targets Vulnerable To SQL Injection

4 years ago

Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine. Options…

Bheem : Tool To Carry Out Various Tools And Recon Process

4 years ago

Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process…

Bento : A Minimal Fedora-Based Container For Penetration Tests

4 years ago

A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and…

Scilla : Information Gathering Tool (DNS/Subdomain/Port Enumeration)

4 years ago

Scilla is a information gathering tool (DNS/Subdomain/Port Enumeration). Installation First of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla…

Freki : Malware Analysis Platform

4 years ago

Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse engineering;Provide an easy-to-use REST API…

Ghost : An Android Post-Exploitation Framework

4 years ago

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost…

ToRat : A Remote Administration Tool Written In Go Using Tor As A Transport Mechanism & RPC For Communication

4 years ago

ToRat is a Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows,…

WSMan-WinRM : Scripts For Executing Remote Commands Over WinRM Using The WSMan.Automation COM Object

4 years ago

WSMan-WinRM is a collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM…

Stegseek : Worlds Fastest Steghide Cracker, Chewing Through Millions Of Passwords Per Second

5 years ago

Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built…

Slipstreaming : NAT Slipstreaming Allows An Attacker To Remotely Access Any TCP/UDP Services

5 years ago

NAT Slipstreaming exploits the user's browser in conjunction with the Application Level Gateway (ALG) connection tracking mechanism built into NATs,…