Tcpflow – To Monitor, Capture & Dump Packets

6 years ago

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…

Mallet – A Framework For Creating Proxies

6 years ago

Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just…

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts

6 years ago

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This…

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks

6 years ago

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions…

PacVim – A Game That Teaches You Vim Commands

6 years ago

PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner.  In…

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

6 years ago

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can…

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

6 years ago

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire…

Introspy-iOS : Security Tool For Profiling iOS Application at Runtime

6 years ago

Introspy-iOS is a blackbox tool to help understand what an iOS application is doing at runtime and assist in the…

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

6 years ago

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and…

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

6 years ago

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap…