Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

6 years ago

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will…

Blackowl – Tool To Gather Information, Based On Operative-Framework

6 years ago

Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and…

Seeker – Find Device Information & Geo Location with High Accuracy

6 years ago

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker is an…

Camelishing – Social Engineering Tool

6 years ago

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro…

Security Monkey – AWS & GCP Accounts For Alerts On Insecure Configurations

6 years ago

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for…

Scout2 – Security Auditing Tool For AWS Environments

6 years ago

Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers…

Hindsight – Tool For Analyzing Web Artifacts Chrome Browser & Chromium-Based Applications

6 years ago

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web…

Joomscan – OWASP Joomla Vulnerability Scanner Project

6 years ago

OWASP JoomScan is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them. If you…

WSSAT – Web Service Security Assessment Tool

6 years ago

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete…

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

6 years ago

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign…