Kali Linux

KRF : A Kernelspace Randomized Faulter

KRF is a Kernelspace Randomized Faulter. It currently supports the Linux and FreeBSD kernels. Fault injection is a software testing…

5 years ago

SET : The Social-Engineer Toolkit Repository From TrustedSec

The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack…

5 years ago

GrapheneX : Automated System Hardening Framework

GrapheneX is an automated system hardening framework. Although the current technology tries to design systems as safe as possible, security…

5 years ago

XSpear : Powerfull XSS Scanning & Parameter Analysis

XSpear is XSS Scanner on ruby gems. Key Features Pattern matching based XSS scanningDetect alert confirm prompt event on headless…

5 years ago

Theo : Ethereum Recon And Exploitation Tool

Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features Automatic smart contract scanning which…

5 years ago

AutoRecon : Multi Threaded Network Reconnaissance Tool

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool…

5 years ago

WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot is a WiFi-Penetest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack). It is built to provide clients…

5 years ago

Memguard : Secure Software Enclave For Storage Of Sensitive Information In Memory

MemGuard secure software enclave for storage of sensitive information in memory. This package attempts to reduce the likelihood of sensitive…

5 years ago

Usbrip : Simple CLI Forensics Tool For Tracking USB Device Artifacts

Usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics tool with CLI interface that lets…

5 years ago

MSNM Sensor – Multivariate Statistical Network Monitoring Sensor

MSNM Sensor (Multivariate Statistical Network Monitoring-Sensor) shows the practical suitability of the approaches found in PCA-MSNM and in Hierarchical PCA-MSNM…

5 years ago