Token Reverser : Word List Generator To Crack Security Tokens

5 years ago

Token Reverser is a word list generator to crack security tokens. Example Use Case You are testing reset password functionReset…

ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce

5 years ago

ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as…

AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

5 years ago

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names Also Read - Betwixt :…

Jeopardize : A Low Cost Threat Intelligence&Response Tool

5 years ago

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response…

Tea : SSH-Client Worm

5 years ago

Tea is a ssh-client worm made with tas framework. How it works? This is a fakessh-client that manipulates the tty…

Microsoft WinUI : Windows UI Library Roadmap

5 years ago

WinUI is the native UI platform for Windows 10. This document outlines the prospective roadmap for new website through 2019…

Zelos : A Comprehensive Binary Emulation Platform

5 years ago

Zelos is a comprehensive binary emulation platform. It (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of it is…

Pickl3 : Windows Active User Credential Phishing Tool

5 years ago

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational…

Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel

5 years ago

Betwixt is a web Debugging Proxy based on Chrome DevTools Network panel.Betwixt will help you analyze web traffic outside the…

Dirble : Fast Directory Scanning And Scraping Tool

5 years ago

Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy…