R K

ImaginaryC2:Python Tool Help In Network Behavioral Analysis Of Malware

ImaginaryC2 is a python tool which aims to help in the behavioral (network) analysis of malware. It hosts a HTTP…

7 years ago

NETworkManager – A Powerful Tool For Managing Networks & Troubleshoot Network Problems

NETworkManager is a powerful tool for managing networks and troubleshoot network problems. Let us have a look on the features…

7 years ago

Malcom – Malware Communications Analyzer 2019

Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic, and cross-reference them…

7 years ago

Tcpreplay – Pcap Editing & Replay Tools For UNIX & Windows

Tcpreplay is a suite of GPLv3 licensed utilities for UNIX operating systems for editing and replaying network traffic which was…

7 years ago

Knock – Tool Designed To Enumerate Subdomains

Knock is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to…

7 years ago

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;…

7 years ago

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to…

7 years ago

Novahot – A Webshell Framework For Penetration Testers

Novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written in…

7 years ago

DjangoHunter : Tool To Identify Incorrectly Configured Django Applications

Djangohunter is a tool designed to help identify incorrectly configured Django applications that are exposing sensitive information. DjangoHunter Usage Usage:…

7 years ago

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity…

7 years ago