Firework – Tool To Interact With Microsoft Workplaces Creating Valid Files

6 years ago

Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.…

HUNT – Burp Suite Pro/Free and OWASP ZAP Extensions

6 years ago

HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability…

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On Hybrid-Analysis

6 years ago

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In…

SQLMap v1.2.9 – Automatic SQL Injection & Database Takeover Tool

6 years ago

SQLMap v1.2.9 is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and…

Peda – Python Exploit Development Assistance for GDB

6 years ago

PEDA is a python exploit development assistance for GDB. Features Enhance the display of gdb: colorize and display disassembly codes,…

KisMac2 – Free Open Source Wireless Stumbling & Security Tool For Mac OS X

6 years ago

KisMAC2 is a free, open source wireless stumbling and security tool for Mac OS X. This project, is an active…

Java-Stager : A PoC To Download, Compile & Execute A Java File In Memory

6 years ago

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk…

htrace.sh – Simple Shell Script To Debugging Http/Https Traffic Tracing

6 years ago

htrace.sh simple shell script to debugging http/https traffic tracing, response headers and mixed-content. Scanning domain using Nmap NSE Library. Support…

Scrounger – Mobile Application Testing Toolkit

6 years ago

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There…

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

6 years ago

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities…