Kali Linux

PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

PBTK is a tool that can be used for reverse engineering and fuzzing protobuf based application. Protobuf is a serialization…

6 years ago

theTHE : The Threat Hunting Environment

You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…

6 years ago

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…

6 years ago

Nginx Log Check : Nginx Log Security Analysis Script

Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for…

6 years ago

Haaukins : A Highly Accessible & Automated Virtualization Platform for Security Education

Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and…

6 years ago

CyberRange : The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for…

6 years ago

Dsiem : Security Event Correlation Engine For ELK Stack

Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and…

6 years ago

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the msfrpc…

6 years ago

RTTM : Real Time Threat Monitoring Tool

Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of…

6 years ago

HashCobra : Hash Cracking Tool

HashCobra is a tool uses a new method to crack hashes. With the help of rainbow tables concept this tool…

6 years ago