IPv6Tools : A Robust Modular Framework

5 years ago

The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled…

Pytm : A Pythonic Framework For Threat Modeling

5 years ago

Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm…

InjuredAndroid : A Vulnerable Android Application

5 years ago

InjuredAndroid is a vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup…

FockCache : Minimalized Test Cache Poisoning

5 years ago

FockCache is a minimalized test cache poisoning. It tries to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on…

Acunetix – Web Application Security Scanner

5 years ago

Acunetix is the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new…

SEcraper : Search Engine Scraper Tool With BASH Script

5 years ago

SEcraper is a search engine scraper tool with BASH script. Dependency curl (cli) Available Search Engine Ask.comSearch.yahoo.comBing.com Also Read -…

Re2Pcap : Create PCAP file From Raw HTTP Request Or Response In Seconds

5 years ago

Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using it and test them against…

TakeOver : Sub-Domain TakeOver Vulnerability Scanner

5 years ago

Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed…

MISP – Dashboard For A Real Time Overview Of Threat Intelligence From MISP Instances

5 years ago

MISP is a dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The…

Dufflebag : Search Exposed EBS Volumes For Secrets

5 years ago

Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally…