AbsoluteZero : Python APT Backdoor

5 years ago

AbsoluteZero is a Python APT backdoor, optimised for Red Team Post Exploitation Tool, it can generate binary payload or pure…

Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

5 years ago

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git…

WAES : Web Auto Enum & Scanner

5 years ago

WAES is nothing but Web Auto Enum & Scanner. Doing HTB or other CTFs enumeration against targets with HTTP(S) can…

BADministration : Tool Which Interfaces with Management or Administration Applications

5 years ago

BADministration is a tool which interfaces with management or administration applications from an offensive standpoint. It attempts to provide offsec…

SQLMap : Automatic SQL Injection & Database Takeover Tool

5 years ago

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and…

CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

5 years ago

Welcome to CommandoVM a fully customizable, Windows-based security distribution for penetration testing and red teaming. Installation Requirements Windows 7 Service…

Skadi : Collect, Process & Hunt With Host Based Data From MacOS, Windows & Linux

5 years ago

Skadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artifacts…

KRF : A Kernelspace Randomized Faulter

5 years ago

KRF is a Kernelspace Randomized Faulter. It currently supports the Linux and FreeBSD kernels. Fault injection is a software testing…

SET : The Social-Engineer Toolkit Repository From TrustedSec

5 years ago

The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack…

GrapheneX : Automated System Hardening Framework

5 years ago

GrapheneX is an automated system hardening framework. Although the current technology tries to design systems as safe as possible, security…