imago Forensics : A Python Tool That Extract Digital Evidences From Images

6 years ago

Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic…

VSHG : A Standalone Addon for GnuPG

7 years ago

VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for…

Angr : A Powerful & User-Friendly Binary Analysis Platform

7 years ago

Angr is a platform-agnostic binary analysis framework. It is a suite of Python 3 libraries that let you load a…

Ntopng : Web-based Traffic & Security Network Traffic Monitoring

7 years ago

Ntopng is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop…

HT-WPS-Breaker : High Touch WPS Breaker

7 years ago

High Touch HT-WPS-BREAKER is a small tool based on the bash script language, it can help you to extract the…

R3Con1Z3R : A Lightweight Web Information Gathering Tool With an Intuitive Features

7 years ago

R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment…

nodeCrypto : Ransomware written in NodeJs

7 years ago

nodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you…

Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook & Gmail Credentials

7 years ago

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers. Unlike other…

Wordlistctl : Fetch, Install & Search Wordlist Archives From Websites & Torrent Peers

7 years ago

Wordlistctl is a script to fetch, install, update and search wordlist archives from websites offering wordlists with more than 2900…

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in Electron Applications

7 years ago

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can use…