Hacking Tools

B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

10 months ago

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…

10 months ago

WinDiff: A Comprehensive Tool for Windows Binary Comparison and Analysis

WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries…

11 months ago

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX…

12 months ago

RustHound : A Cross-Platform BloodHound Collector Tool

In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built…

1 year ago

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

1 year ago

Cartographer – Advanced Code Coverage Mapping in Ghidra

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love…

1 year ago

Donut-Decryptor : Unmasking Binary Secrets

Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in…

1 year ago

BucketLoot – An Automated S3 Bucket Inspector

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who…

1 year ago

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are…

1 year ago