Findomain : Fastest & Cross-Platform Subdomain Enumerator

6 years ago

Findomain is a fastest and cross-platform subdomain enumerator. It comparison gives you a idea why you should use findomain instead…

Goop : Google Search Scraper

6 years ago

Goop can perform google searches without being blocked by the CAPTCHA or hitting any rate limits. How it works? Facebook…

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

6 years ago

ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.…

HackerTarget : Tools And Network Intelligence To Help Organisations With Attack Surface Discovery

6 years ago

HackerTarget is tools and network intelligence to help organisations with attack surface discovery. Use open source tools and network intelligence…

Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

6 years ago

Seccomp provide powerful tools for seccomp analysis. This project is targeted to (but not limited to) analyze seccomp sandbox in…

AbsoluteZero : Python APT Backdoor

6 years ago

AbsoluteZero is a Python APT backdoor, optimised for Red Team Post Exploitation Tool, it can generate binary payload or pure…

Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

6 years ago

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git…

WAES : Web Auto Enum & Scanner

6 years ago

WAES is nothing but Web Auto Enum & Scanner. Doing HTB or other CTFs enumeration against targets with HTTP(S) can…

BADministration : Tool Which Interfaces with Management or Administration Applications

6 years ago

BADministration is a tool which interfaces with management or administration applications from an offensive standpoint. It attempts to provide offsec…

SQLMap : Automatic SQL Injection & Database Takeover Tool

6 years ago

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and…