RITA : Real Intelligence Threat Analytics

5 years ago

RITA is a real intelligence threat analytics. RITA is an open source framework for network traffic analysis. The framework ingests…

How To Prevent Hacking in 2020

5 years ago

Hacking is a term that refers to an unauthorized intrusion into a computer network or system. Hackers may alter a…

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

5 years ago

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in…

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

5 years ago

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed…

SMTPTester : Small Python3 Tool To Check Common Vulnerabilities In SMTP Servers

5 years ago

SMTPTester is a python3 tool to test SMTP server for 3 common vulnerabilities: Spoofing - The ability to send a…

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

5 years ago

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing…

FSMon : Monitor Filesystem On iOS / OS X / Android / FirefoxOS / Linux

5 years ago

FSMon or FileSystem Monitor utility that runs on Linux, Android, iOS and OSX. Brought to you by Sergi Àlvarez at…

Traxss : Automated XSS Vulnerability Scanner

5 years ago

Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test…

DECAF : Dynamic Executable Code Analysis Framework

5 years ago

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the…

Mosca : Manual Search Tool To Find Bugs Like A Grep Unix Command

5 years ago

Mosca is a manual analysis tool to find bugs like a grep unix command and since it is not dynamic…