nmapAutomator : A Script That You Can Run In The Background

5 years ago

nmapAutomator is a script that you can run in the background. The main goal for this script is to automate…

Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

5 years ago

Quark Engine is an Obfuscation-Neglect Android Malware Scoring System. Android malware analysis engine is not a new story. Every antivirus…

Malwinx : Just A Normal Flask Web App To Understand Win32api With Code Snippets & References

5 years ago

Malwinx is a normal flask web app to learn win32api with code snippets and references. Malwinx Prerequisite You need to…

PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface

5 years ago

Pakuri is a Penetration test Achieve Knowledge Unite Rapid Interface. Pentesters love to move their hands. However, I do not…

Pylane : An Python VM Injector With Debug Tools, Based On GDB

5 years ago

Pylane is a python vm injector with debug tools, based on gdb and ptrace. Pylane uses gdb to trace python…

AttackSurfaceMapper : Tool That Aims To Automate The Reconnaissance Process

5 years ago

AttackSurfaceMapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack…

HuskyCI : Performing Security Tests Inside Your CI

5 years ago

HuskyCI is an open source tool that orchestrates security tests and centralizes all results into a database for further analysis…

Shelly : Simple Backdoor Manager With Python

5 years ago

Shelly adalah sebuah tool sederhana yang ditulis menggunakan Python, yang berfungsi untuk meremote sebuah website. Installation $ git clone https://github.com/tegal1337/Shelly…

Spraykatz : Credentials Gathering Tool Automating Remote Procdump & Parse Of Lsass Process

5 years ago

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It…

BetterBackdoor : A Backdoor With A Multitude Of Features

5 years ago

BetterBackdoor is a backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as…