Kali Linux

Cloudcheck : Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in…

5 years ago

Pyattck : A Python Module To Interact With The Mitre ATT&CK Framework

A Python Module to interact with the Mitre ATT&CK Framework. Pyattck has the following notable features in it's current release: Retrieve…

5 years ago

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.…

5 years ago

Airopy : Get Clients And Access Points

Airopy is a wireless packet capture to get clients and access points. With Alfa cards this script works correctly. Dependencies…

5 years ago

AMIRA: Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters,…

5 years ago

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners…

5 years ago

Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers

Dockernymous is a script used to create a whonix like gateway/workstation environment with docker containers. It is a start script…

5 years ago

Hardening up Your Cyber Defence With Risk Assessment

Your company faces an array of cyber threats, which are both internal and external. Cybersecurity risk assessment is meant to…

5 years ago

HiddenEye : Modern Phishing Tool With Advanced Functionality

HiddenEye is a modern phishing tool with advanced functionality and it also currently have Android support. Now you will have…

5 years ago

Top 7 Best Open Source SQL Injection Tools – 2019

SQL injection is a standout amongst the most widely recognised attacks against web applications. Here is the list of Best…

5 years ago