Invoke-Antivm : Powershell Tool For VM Evasion

5 years ago

Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell. Compatibility Run the script…

Bulwark : An Organizational Asset & Vulnerability Management Tool

5 years ago

Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports. Jira Integration…

Doctrack – Tool To Manipulate & Insert Tracking Pixels Into Office Open XML Documents

5 years ago

Doctrack is a tool to manipulate and insert tracking pixels into Office Open XML documents. Features Insert tracking pixels into…

Rehex : Reverse Engineers’ Hex Editor

5 years ago

Rehex is a cross-platform (Windows, Linux, Mac) hex editor for reverse engineering, and everything else. Features Large (1TB+) file supportDecoding…

GPing : Ping With A Graph

5 years ago

GPing is a Ping, but with a graph. Install FYI: The old Python version can be found under the python…

Garud : An Automation Tool To Scans Sub-Domains

5 years ago

Garud is an automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection…

Go_Parser : Yet Another Golang Binary Parser For IDAPro

5 years ago

This master branch is written in Python2 for IDAPython, and tested only on IDA7.2/IDA7.0. If you use IDAPython with Python3…

Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

5 years ago

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the…

What Are The Components of SQL Server?

5 years ago

To make effective use of SQL Server, you need to get to grips with the key components that it consists…

FinalRecon : The Last Web Recon Tool You’ll Need

5 years ago

FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the…