Kali Linux

KsDumper : Dumping Processes Using The Power Of Kernel Space

KsDumper is a dumping processes using the power of kernel space. It is a custom driver that would allow me…

5 years ago

Yarasafe : SAFE Embeddings To Match Functions In Yara

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding…

5 years ago

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

5 years ago

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework…

5 years ago

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions,…

5 years ago

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. Requirements It only works with Python…

5 years ago

TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API…

5 years ago

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find…

5 years ago

Gophish : Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily…

5 years ago

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of…

5 years ago