Wordlistctl : Fetch, Install & Search Wordlist Archives From Websites & Torrent Peers

6 years ago

Wordlistctl is a script to fetch, install, update and search wordlist archives from websites offering wordlists with more than 2900…

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in Electron Applications

6 years ago

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can use…

SALT – SLUB ALlocator Tracer for the Linux Kernel

6 years ago

Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit,…

Reko : A General Purpose Decompiler

6 years ago

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available…

PHP : Security Check List 2019

6 years ago

PHP : Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML.…

Beef : The Browser Exploitation Framework Project

6 years ago

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.…

SecLists : Security Tester’s Companion For Security Assessments

6 years ago

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in…

WAF ByPass : Firewall Bypass Script Based On DNS History Records

6 years ago

Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if…

Pompem : Tool For Exploits & Vulnerability in Database

6 years ago

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.…

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators

6 years ago

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell (SSH)…