Kali Linux

HashCatch : Capture Handshakes Of Nearby WiFi Networks Automatically

Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in…

5 years ago

Five Benefits That Will Convince You to Integrate Your Systems

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad…

5 years ago

Nuages : A Modular C2 Framework 2019

Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must…

5 years ago

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for…

5 years ago

Sudomy : Subdomain Enumeration Tool Created Using A Bash Script

Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and…

5 years ago

NebulousAD : Automated Credential Auditing Tool

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a redact-by-group…

5 years ago

PHPStan – PHP Static Analysis Tool – Discover Bugs In Your Code Without Running It

PHPStan focuses on finding errors in your code without actually running it. It catches whole classes of bugs even before…

5 years ago

5 Essential Tips to Protect Your Student Data Privacy

The rapid advancement of technology has made it easier for students to protect their information and engage with their teachers…

5 years ago

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for…

5 years ago

4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images…

5 years ago