5 Essential Tips to Protect Your Student Data Privacy

6 years ago

The rapid advancement of technology has made it easier for students to protect their information and engage with their teachers…

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

6 years ago

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for…

4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

6 years ago

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images…

AIL Framework : Analysis Information Leak Framework

6 years ago

AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured…

Airgeddon : This Is A Multi-Use Bash Script For Linux Systems To Audit Wireless Networks

6 years ago

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Content & Features HomeFeaturesScreenshotsWallpapers Requirements RequirementsCompatibilityEssential ToolsOptional…

Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

6 years ago

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations…

IPRotate : Extension For Burp Suite Which Uses AWS API Gateway To Rotate Your IP On Every Request

6 years ago

IPRotate is a tool used for Burp Suite which uses AWS API Gateway to change your IP on every request.…

LdapDomainDump : Active Directory Information Dumper via LDAP

6 years ago

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can…

Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

6 years ago

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use…

AutoRDPwn : The Shadow Attack Framework

6 years ago

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as…