TuxResponse : Linux Incident Response 2020

6 years ago

TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems…

LNAV : Log File Navigator 2020

6 years ago

LNAV is an enhanced log file viewer that takes advantage of any semantic information that can be gleaned from the…

Stowaway : Multi-hop Proxy Tool For Pentesters

6 years ago

Stowaway is Multi-hop proxy tool for security researchers and pentesters Users can easily proxy their network traffic to intranet nodes…

Git Vuln Finder : Finding Potential Software Vulnerabilities From Git Commit Messages

6 years ago

Git Vuln Finder finds potential software vulnerabilities from git commit messages. The output format is a JSON with the associated…

Wafw00f : Identify & Fingerprint Web Application Firewall

6 years ago

WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. To do its magic, WAFW00F…

XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

6 years ago

XposedOrNot or XoN tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords.…

Dsync : IDAPython Plugin That Synchronizes Disassembler & Decompiler Views

6 years ago

Dsync is a IDAPython plugin that synchronizes decompiled and disassembled code views. Please refer to comments in source code for…

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

6 years ago

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact…

LKWA : Lesser Known Web Attack Lab

6 years ago

LKWA or Lesser Known Web Attack Lab is for intermediate pentester that can test and practice lesser known web attacks…

Multiscanner : Modular File Scanning/Analysis Framework

6 years ago

MultiScanner is a file analysis framework that assists the user in evaluating a set of files by automatically running a…