SharpStat : C# Utility That Uses WMI To Run CMD

6 years ago

SharpStat is a C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file,…

KsDumper : Dumping Processes Using The Power Of Kernel Space

6 years ago

KsDumper is a dumping processes using the power of kernel space. It is a custom driver that would allow me…

Yarasafe : SAFE Embeddings To Match Functions In Yara

6 years ago

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding…

How to Protect Yourself Against Common Password Attacks

6 years ago

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

6 years ago

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework…

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

6 years ago

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions,…

Corsy : CORS Misconfiguration Scanner

6 years ago

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. Requirements It only works with Python…

TeleGram-Scraper : Telegram Group Scraper Tool

6 years ago

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API…

Grouper2 : To Find Vulnerabilities In AD Group Policy

6 years ago

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find…

Gophish : Open-Source Phishing Toolkit

6 years ago

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily…