Cloudcheck : Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail

6 years ago

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in…

Pyattck : A Python Module To Interact With The Mitre ATT&CK Framework

6 years ago

A Python Module to interact with the Mitre ATT&CK Framework. Pyattck has the following notable features in it's current release: Retrieve…

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

6 years ago

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.…

Airopy : Get Clients And Access Points

6 years ago

Airopy is a wireless packet capture to get clients and access points. With Alfa cards this script works correctly. Dependencies…

AMIRA: Automated Malware Incident Response & Analysis

6 years ago

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters,…

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

6 years ago

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners…

Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers

6 years ago

Dockernymous is a script used to create a whonix like gateway/workstation environment with docker containers. It is a start script…

Hardening up Your Cyber Defence With Risk Assessment

6 years ago

Your company faces an array of cyber threats, which are both internal and external. Cybersecurity risk assessment is meant to…

HiddenEye : Modern Phishing Tool With Advanced Functionality

6 years ago

HiddenEye is a modern phishing tool with advanced functionality and it also currently have Android support. Now you will have…

Top 7 Best Open Source SQL Injection Tools – 2019

6 years ago

SQL injection is a standout amongst the most widely recognised attacks against web applications. Here is the list of Best…