Kali Linux

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

GIVINGSTORM is a breeze to use. Simply clone the directory, and cd into it. The beginnings of a C2 framework.…

5 years ago

OWASP Threat Dragon Desktop

Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations.…

5 years ago

Cloudtopolis : Cracking Hashes In The Cloud For Free

Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and…

5 years ago

Colabcat – Running Hashcat On Google Colab With Session Backup And Restore

Colabcat is a tool used to run hashcat on Google colab with session backup and restore. Usage Go to the…

5 years ago

CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner

A CorsMe misconfiguration scanner tool based on golang with speed and precision in mind ! Misconfiguration type this scanner can…

5 years ago

Sifter : OSINT, Recon & Vulnerability Scanner

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order…

5 years ago

Hmmcookies – Grab Cookies From Firefox, Chrome & Opera

Hmmcookies is a tool used to grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC). Install git…

5 years ago

Business Secure: How AI is Sneaking into our Restaurants

Prior to pandemic days, the restaurant industry talked of computers that might end up taking over their daily responsibilities. They’d…

5 years ago

InQL : A Burp Extension For GraphQL Security Testing

InQL is a security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone…

5 years ago

Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability POC

Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None AlgorithmRSAtoHMAC Refer to this link about insights…

5 years ago