Armory – Tool To Take Lot Of External & Discovery Data

8 years ago

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools,…

Rootless Jailbreakd – Jailbreakd Offering Some More Functionality To The Jailbreak

8 years ago

Rootless Jailbreakd is A small jailbreakd offering some more functionality to the jailbreak. Uses CPDisctributedMessageCenter. To compile you need theos…

Frisky – Tools To Assist Binary App Reversing & Augmentation

8 years ago

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if…

Dejavu – Open Source Deception Framework

8 years ago

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve…

Delta – SDN Security Evaluation & Penetration Testing Framework

8 years ago

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the…

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

8 years ago

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on…

Onion nmap To Scan Hidden Onion Services

8 years ago

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to…

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

8 years ago

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as…

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

8 years ago

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log…

Curate – A tool for fetching archived URLs

8 years ago

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will…