Kali Linux

JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

A ready to use JSONP endpoints to help bypass content security policy of different websites. The tool was presented during…

6 years ago

Arjun : HTTP Parameter Discovery Suite

Arjun is a web applications use parameters (or queries) to accept user input, take the following example into consideration. http://api.example.com/v1/userinfo?id=751634589…

6 years ago

HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day…

6 years ago

Femida : Automated blind-XSS Search For Burp Suite

Femida is automated blind-xss search plugin for Burp Suite. Installation Git clone https://github.com/wish-i-was/femida.git Burp -> Extender -> Add -> find and select…

6 years ago

Slither : Static Analyzer for Solidity

Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual…

6 years ago

AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present…

6 years ago

Password Lense: Reveal Character Types In A Password

Certain characters in passwords ('O' and '0', 'I' and 'l', etc.) can be hard to identify when you need to…

6 years ago

Snare : Super Next Generation Advanced Reactive HonEypot

Snare is a super next generation advanced reactive honeypot.It is a web application honeypot sensor attracting all sort of maliciousness…

6 years ago

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the collection…

6 years ago

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known…

6 years ago