Yarasafe : SAFE Embeddings To Match Functions In Yara

5 years ago

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding…

How to Protect Yourself Against Common Password Attacks

5 years ago

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

5 years ago

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework…

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

5 years ago

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions,…

Corsy : CORS Misconfiguration Scanner

5 years ago

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. Requirements It only works with Python…

TeleGram-Scraper : Telegram Group Scraper Tool

5 years ago

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API…

Grouper2 : To Find Vulnerabilities In AD Group Policy

5 years ago

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find…

Gophish : Open-Source Phishing Toolkit

5 years ago

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily…

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

5 years ago

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of…

Scallion : GPU-Based Onion Hash Generator

5 years ago

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono…