MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool

6 years ago

MCExtractor is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users…

Trape – People Tracker On The Internet

6 years ago

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in…

Skiptracer – OSINT Python Webscaping Framework

6 years ago

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining…

Janusec – Golang Based Application Security Solution Which Provides WAF

6 years ago

Janusec Application Gateway, an application security solutions which provides WAF (Web Application Firewall), unified web administration portal, private key protection,…

Sheepl – Creating Realistic User Behaviour For Supporting Tradecraft Development Within Lab Environments

6 years ago

Sheepl is a tool for creating realistic user behaviour for supporting tradecraft development within lab environments. There are lots of…

ZIP File Raider – Burp Extension for ZIP File Payload Testing

6 years ago

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily…

NodeJsScan – Static Security Code Scanner For Node.js Applications

6 years ago

NodeJsScan is a static security code scanner (SAST) for Node.js applications. Configure & Run Install Postgres and configure SQLALCHEMY_DATABASE_URI in…

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis Of Malicious Documents

6 years ago

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph,…

Ache – Web Crawler For Domain-Specific Search

6 years ago

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to…

SSH Auditor – Scan For Weak SSH Passwords On Your Network

6 years ago

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check…