Virtuailor : IDAPython Tool For Creating Automatic C++ Virtual Tables In IDA Pro

6 years ago

Virtuailor is an IDAPython tool that reconstructs vtables for C++ code written for intel architecture, both 32bit and 64bit code…

PESTO – PE (Files) Statistical Tool

6 years ago

PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching…

What to Look for in the Right SOC Program – A Complete Guide

6 years ago

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…

UBoat : HTTP Botnet Project

6 years ago

UBoat is a POC HTTP Botnet designed to replicate a full weaponised commercial botnet. What is a Botnet ? When…

ThreatIngestor : Extract & Aggregate Threat Intelligence

6 years ago

ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and…

LinPwn : Interactive Post Exploitation Tool

6 years ago

LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation. Connection Set your IP…

Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

6 years ago

POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable…

XORpass : Encoder To Bypass WAF Filters Using XOR Operations

6 years ago

XORpass is an encoder to bypass WAF filters using XOR operations. Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $…

CloudUnflare : Reconnaissance Real IP Address for Cloudflare Bypass

6 years ago

CloudUnflare is a tool used to reconnaissance Real IP address for Cloudflare Bypass. Preparation: 1. CompleteDNS API Create an account…

Cryptovenom : The Cryptography Swiss Army Knife

6 years ago

CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms,…