Kali Linux

Intercept : Policy As Code Static Analysis Auditing

Intercept stupidly easy to use, small footprint Policy as Code subsecond command-line scanner that leverages the power of the fastest…

5 years ago

Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability

Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework has the…

5 years ago

SkyWrapper : Tool To Discover Suspicious Creation Forms

SkyWrapper is an open-source project which analyzes behaviors of temporary tokens created in a given AWS account. The tool is…

5 years ago

RMS : Runtime Mobile Security

RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at…

5 years ago

Elemental : An ATT&CK Threat Library

Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It…

5 years ago

ROADTools : The Azure AD Exploration Framework

ROADtools is a framework to interact with Azure AD. It currently consists of a library (roadlib) and the ROADrecon Azure…

5 years ago

Process of Becoming The Open Group TOGAF 9-Certified through OG0-091 and OG0-092 Exam Dumps

Certifications from a global association like The Open Group are more than just skill validation. It’s apparently a manner of…

5 years ago

Terrier : A Image & Container Analysis Tool

Terrier is a Image and Container analysis tool that can be used to scan Images and Containers to identify and…

5 years ago

wxHexEditor : Official GIT Repo For Devices On Linux, Windows & MacOSX

wxHexEditor is a Hex Editor / Disk Editor for Huge Files or Devices on Linux, Windows and MacOSX. It is…

5 years ago

When technology tempts you to cheat on your partner

There is nothing wrong with having a Facebook or WhatsApp account, nor with having friends of the opposite sex, as…

5 years ago