Kali Linux

Erlik 2 : Vulnerable Flask App

Erlik 2 is a vulnerable Flask Web App. It is a lab environment created for people who want to improve…

2 years ago

Utkuici – Nessus Automation

Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great…

2 years ago

Java-Remote-Class-Loader : Tool To Send Java Bytecode Victims To Load & Execute

Java-Remote-Class-Loader is a tool that allows you to send Java bytecode in the form of class files to your clients…

2 years ago

Bayanay – Python Wardriving Tool

Bayanay is a Python Wardriving tool. WarDriving is the act of navigating, on foot or by car, to discover wireless…

2 years ago

Deadfinder – Find Dead-Links (Broken Links)

Dead link (broken link) means a link within a web page that cannot be connected. These links can have a…

2 years ago

Pmanager – Store And Retrieve Your Passwords From A Secure Offline Database

PManager Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent…

2 years ago

TestSSL.SH : Testing TLS/SSL Encryption Anywhere On Any Port

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers,…

2 years ago

Lunar : UNIX Security Auditing Tool

lunar, Lockdown UNix Auditing and Reporting Version Current version 8.0.5 Refer to lunar.sh and changelog for more up to date…

2 years ago

Psudohash : Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns

psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by…

2 years ago

pyFlipper : Unoffical Flipper Zero Cli Wrapper Written In Python

pyFlipper, is a Unoffical Flipper Zero cli wrapper written in Python. Functions and characteristics  Flipper serial CLI wrapper Websocket client interface…

2 years ago