Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

5 years ago

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the…

What Are The Components of SQL Server?

5 years ago

To make effective use of SQL Server, you need to get to grips with the key components that it consists…

FinalRecon : The Last Web Recon Tool You’ll Need

5 years ago

FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the…

Linux Evil Toolkit For Pentest Professionals

5 years ago

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for…

ScriptHunter : Tool To Find JavaScript Files On Websites

5 years ago

Scripthunter is a tool that finds javascript files for a given website. To scan Google, simply run ./scripthunter.sh https://google.com. Note…

Fama : Forensic Analysis For Mobile Apps

5 years ago

Fama is a tool for android extraction and analysis framework with an integrated Autopsy Module. Dump easily user data from…

Leonidas : Automated Attack Simulation In The Cloud, Complete With Detection Use Cases

5 years ago

This is the repository containing Leonidas, a framework for executing attacker actions in the cloud. It provides a YAML-based format…

NFCGate : An NFC Research Toolkit Application For Android

5 years ago

NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching…

Py3webfuzz : A Python3 Module To Assist In Fuzzing Web Applications

5 years ago

Based on pywebfuzz, Py3webfuzz is a Python3 module to assist in the identification of vulnerabilities in web applications, Web Services…

PCWT : A Web Application That Makes It Easy To Run Your Pentest & Bug Bounty Projects

5 years ago

PCWT is a web application that makes it easy to run your pentest and bug bounty projects. The app provides…