Sifter : A Osint, Recon & Vulnerability Scanner

5 years ago

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order…

WireGuard Brings The Evolution of VPNs

5 years ago

Most people don’t care about how the internet works; they want it to work. The same goes for other essential…

FuzzBench : Fuzzer Benchmarking As A Service

6 years ago

FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal…

SSRF Sheriff : Server Side Request Forgery

6 years ago

SSRF Sheriff is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London…

Evil SSDP : Create Fake UPnP Devices To Phish For Credentials

6 years ago

Evil SSDP responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear…

Proton : Windows Post-Exploitation Framework Similar

6 years ago

Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it does…

NTLMRecon : Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints

6 years ago

NTLMRecon is built with flexibilty in mind. A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find…

HoneyBot : Capture, Upload & Analyze Network Traffic

6 years ago

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides…

HTTP Asynchronous Reverse Shell

6 years ago

Http asynchronous reverse shell is a tool used for asynchronous reverse shell using the HTTP protocol. Why ? Today there…

Entropy : Set Of Tools To Exploit Netwave & GoAhead IP Webcams

6 years ago

Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for…