Kali Linux

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of…

5 years ago

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono…

5 years ago

AntiCheat : Framework To Test Any Anti-Cheat

AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or Code Base…

5 years ago

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup…

5 years ago

Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using…

5 years ago

Lsassy : Extract Credentials From Lsass Remotel

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary…

5 years ago

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there are some…

5 years ago

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and…

5 years ago

Shell Backdoor List : PHP / ASP Shell Backdoor List

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to…

5 years ago

Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It…

5 years ago