Kali Linux

Path Auditor : Detecting Unsafe Path Access Patterns

The Path Auditor is a tool meant to find file access related vulnerabilities by auditing libc functions. Path Auditor idea…

5 years ago

Most Important Security Tips to Protect Your Website From Hackers

Do you think they need your date? Do you think they need access to your credit cards? There is something…

5 years ago

Automatic API Attack Tool 2019

Automatic API Attack Tool is a imperva's customizable API attack tool takes an API specification as an input, generates and…

5 years ago

Silver : Mass Scan IPs For Vulnerable Services

masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows…

5 years ago

Secretx : Extracting API keys & Secrets By Requesting Each URL At The Your List

Secretx is a tool which is mainly used for extracting api keys and secrets by requesting each url at the…

5 years ago

ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch,…

5 years ago

NodeCrypto : Linux Ransomware Written In NodeJs

NodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you…

5 years ago

PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

PBTK is a tool that can be used for reverse engineering and fuzzing protobuf based application. Protobuf is a serialization…

5 years ago

theTHE : The Threat Hunting Environment

You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…

5 years ago

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…

5 years ago