Trape – People Tracker On The Internet

7 years ago

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in…

Skiptracer – OSINT Python Webscaping Framework

7 years ago

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining…

Janusec – Golang Based Application Security Solution Which Provides WAF

7 years ago

Janusec Application Gateway, an application security solutions which provides WAF (Web Application Firewall), unified web administration portal, private key protection,…

Sheepl – Creating Realistic User Behaviour For Supporting Tradecraft Development Within Lab Environments

7 years ago

Sheepl is a tool for creating realistic user behaviour for supporting tradecraft development within lab environments. There are lots of…

ZIP File Raider – Burp Extension for ZIP File Payload Testing

7 years ago

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily…

NodeJsScan – Static Security Code Scanner For Node.js Applications

7 years ago

NodeJsScan is a static security code scanner (SAST) for Node.js applications. Configure & Run Install Postgres and configure SQLALCHEMY_DATABASE_URI in…

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis Of Malicious Documents

7 years ago

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph,…

Ache – Web Crawler For Domain-Specific Search

7 years ago

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to…

SSH Auditor – Scan For Weak SSH Passwords On Your Network

7 years ago

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check…

Hassh : Tool Used To Identify Specific Client & Server SSH Implementations

7 years ago

HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…