Kali Linux

Vulnado – Intentionally Vulnerable Java Application

Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you…

6 years ago

Orbit : Blockchain Transactions Investigation Tool

Orbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered…

6 years ago

Cloudcheck : Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in…

6 years ago

Pyattck : A Python Module To Interact With The Mitre ATT&CK Framework

A Python Module to interact with the Mitre ATT&CK Framework. Pyattck has the following notable features in it's current release: Retrieve…

6 years ago

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.…

6 years ago

Airopy : Get Clients And Access Points

Airopy is a wireless packet capture to get clients and access points. With Alfa cards this script works correctly. Dependencies…

6 years ago

AMIRA: Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters,…

6 years ago

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners…

6 years ago

Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers

Dockernymous is a script used to create a whonix like gateway/workstation environment with docker containers. It is a start script…

6 years ago

Hardening up Your Cyber Defence With Risk Assessment

Your company faces an array of cyber threats, which are both internal and external. Cybersecurity risk assessment is meant to…

6 years ago