SSH3 is a complete revisit of the SSH protocol, mapping its semantics on top of the HTTP mechanisms. In a…
Easy EASM is just that... the easiest to set-up tool to give your organization visibility into its external facing assets.…
This program is a tool written in Python to recover the pre-shared key of a WPA2 WiFi network without any…
In the ever-evolving landscape of cybersecurity, red teamers and bug hunters are constantly seeking new tools to aid in their…
PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…
MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…
In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…
BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…
Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…
CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…