Kali Linux

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for…

6 years ago

4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images…

6 years ago

AIL Framework : Analysis Information Leak Framework

AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured…

6 years ago

Airgeddon : This Is A Multi-Use Bash Script For Linux Systems To Audit Wireless Networks

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Content & Features HomeFeaturesScreenshotsWallpapers Requirements RequirementsCompatibilityEssential ToolsOptional…

6 years ago

Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations…

6 years ago

IPRotate : Extension For Burp Suite Which Uses AWS API Gateway To Rotate Your IP On Every Request

IPRotate is a tool used for Burp Suite which uses AWS API Gateway to change your IP on every request.…

6 years ago

LdapDomainDump : Active Directory Information Dumper via LDAP

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can…

6 years ago

Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use…

6 years ago

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as…

6 years ago

PoshC2 : Python Server for PoshC2

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and…

6 years ago