Lava : Large-scale Automated Vulnerability Addition

6 years ago

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has…

HeapInspect : Inspect Heap In Python

6 years ago

HeapInspect is designed to make heap much more prettier. So let us have some of the feature of this tool…

CHAPS : Configuration Hardening Assessment PowerShell Script

6 years ago

CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy…

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

6 years ago

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper We present our approach and…

IotShark : Monitoring And Analyzing IoT Traffic

6 years ago

IoTShark is a IOT monitoring service that allows users to monitor their IOT devices for trends in data sent/received. Ordinarily,…

TuxResponse : Linux Incident Response 2020

6 years ago

TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems…

LNAV : Log File Navigator 2020

6 years ago

LNAV is an enhanced log file viewer that takes advantage of any semantic information that can be gleaned from the…

Stowaway : Multi-hop Proxy Tool For Pentesters

6 years ago

Stowaway is Multi-hop proxy tool for security researchers and pentesters Users can easily proxy their network traffic to intranet nodes…

Git Vuln Finder : Finding Potential Software Vulnerabilities From Git Commit Messages

6 years ago

Git Vuln Finder finds potential software vulnerabilities from git commit messages. The output format is a JSON with the associated…

Wafw00f : Identify & Fingerprint Web Application Firewall

6 years ago

WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. To do its magic, WAFW00F…