Stowaway : Multi-hop Proxy Tool For Pentesters

5 years ago

Stowaway is Multi-hop proxy tool for security researchers and pentesters Users can easily proxy their network traffic to intranet nodes…

Git Vuln Finder : Finding Potential Software Vulnerabilities From Git Commit Messages

5 years ago

Git Vuln Finder finds potential software vulnerabilities from git commit messages. The output format is a JSON with the associated…

Wafw00f : Identify & Fingerprint Web Application Firewall

5 years ago

WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. To do its magic, WAFW00F…

XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

5 years ago

XposedOrNot or XoN tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords.…

Dsync : IDAPython Plugin That Synchronizes Disassembler & Decompiler Views

5 years ago

Dsync is a IDAPython plugin that synchronizes decompiled and disassembled code views. Please refer to comments in source code for…

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

5 years ago

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact…

LKWA : Lesser Known Web Attack Lab

5 years ago

LKWA or Lesser Known Web Attack Lab is for intermediate pentester that can test and practice lesser known web attacks…

Multiscanner : Modular File Scanning/Analysis Framework

5 years ago

MultiScanner is a file analysis framework that assists the user in evaluating a set of files by automatically running a…

Tishna : Automated Web Application Hacker 2020

5 years ago

Tishna is an complete Automated pentest framework for Servers, Application Layer to Web Security. This software have 62 Options with…

AWS Report – Tool For Analyzing Amazon Resources

5 years ago

AWS Report is a tool for analyzing amazon resources, let us have a look at some of features; Search iam…