LOLBAS – Living Off The Land Binaries And Scripts

7 years ago

LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy…

Bolt : Cross-Site Request Forgery Scanner

7 years ago

Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged.…

IP Obfuscator – Simple Tool to Social Engineer and Bypass Firewall

7 years ago

IP Obfuscator is a simple python script which converts an IP address into different obfuscated forms like integer, hexadecimal or…

Exrex : Irregular Methods On Regular Expressions

7 years ago

Exrex is a command line tool and python module that generates all - or random - matching strings to a…

PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

7 years ago

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually…

Adapt : A Tool To Performs Automated Penetration Testing for WebApps

7 years ago

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy,…

IdentYWAF : Blind WAF Identification Tool

7 years ago

identYwaf is an identification tool that can recognise web protection type (i.e. WAF) based on blind inference. Blind inference is being…

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

7 years ago

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated…

Sh00t : A Testing Environment for Manual Security Testers

7 years ago

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan.…

Killcast : Manipulate Chromecast Devices in your Network

7 years ago

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only,…