Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

7 years ago

Airflowscan is a checklist and tools for increasing security of Apache Airflow. The purpose of this project is provide tools…

Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security & Penetration Test Techniques

7 years ago

Docker Security Playground is an application that allows you to: Create network and network security scenarios, in order to understand…

DrMITM : A Program Designed To Globally Log All Traffic Of A Website

7 years ago

DrMITM is a program designed to globally log all traffic. It sends a request to website and returns the IP…

Sampler : A Tool For Shell Commands Execution, Visualization & Alerting

7 years ago

Sampler is a tool for shell commands execution, visualization and alerting. Configured with a simple YAML file. One can sample…

Findomain : Fastest & Cross-Platform Subdomain Enumerator

7 years ago

Findomain is a fastest and cross-platform subdomain enumerator. It comparison gives you a idea why you should use findomain instead…

Goop : Google Search Scraper

7 years ago

Goop can perform google searches without being blocked by the CAPTCHA or hitting any rate limits. How it works? Facebook…

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

7 years ago

ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.…

HackerTarget : Tools And Network Intelligence To Help Organisations With Attack Surface Discovery

7 years ago

HackerTarget is tools and network intelligence to help organisations with attack surface discovery. Use open source tools and network intelligence…

Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

7 years ago

Seccomp provide powerful tools for seccomp analysis. This project is targeted to (but not limited to) analyze seccomp sandbox in…

AbsoluteZero : Python APT Backdoor

7 years ago

AbsoluteZero is a Python APT backdoor, optimised for Red Team Post Exploitation Tool, it can generate binary payload or pure…