Silver : Mass Scan IPs For Vulnerable Services

6 years ago

masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows…

Secretx : Extracting API keys & Secrets By Requesting Each URL At The Your List

6 years ago

Secretx is a tool which is mainly used for extracting api keys and secrets by requesting each url at the…

ReconCobra : Complete Automated Pentest Framework For Information Gathering

6 years ago

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch,…

NodeCrypto : Linux Ransomware Written In NodeJs

6 years ago

NodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you…

PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

6 years ago

PBTK is a tool that can be used for reverse engineering and fuzzing protobuf based application. Protobuf is a serialization…

theTHE : The Threat Hunting Environment

6 years ago

You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

6 years ago

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…

Nginx Log Check : Nginx Log Security Analysis Script

6 years ago

Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for…

Haaukins : A Highly Accessible & Automated Virtualization Platform for Security Education

6 years ago

Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and…

CyberRange : The Open-Source AWS Cyber Range

6 years ago

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for…