UserLAnd : Run a Linux Distribution or Application on Android

7 years ago

The assets that UserLAnd depends on and the scripts that build them are contained in other repositories. The common assets…

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

7 years ago

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project can…

Command Injection Payload List

7 years ago

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via…

RootOS – macOS Root Helper

7 years ago

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding…

Vuls : Vulnerability Scanner for Linux/FreeBSD, Agentless, Written in Go

7 years ago

Vuls is a vulnerability scanner for Linux/FreeBSD, agentless, written in golang. Also Read - Turbinia : Automation and Scaling of…

Kage – Graphical User Interface for Metasploit Meterpreter & Session Handler

7 years ago

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For…

Chomp-Scan : A Scripted Pipeline of Tools To Streamline The Bug Bounty/Penetration Test Reconnaissance Phase

7 years ago

Chomp-Scan is a scripted pipeline of tools to simplify the bug bounty/penetration test reconnaissance phase, so you can focus on…

Reverse Shell Cheat Sheet 2019

7 years ago

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your…

7 Reasons Why You Should Use PDF Over Word

7 years ago

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its' easy printable…

Catnip : Automated Basic Pentest Tool – Designed For Kali Linux

7 years ago

Catnip tool will make your basic pentesting task like Information Gathering, Auditing, And Reporting so this tool will do every…