Kali Linux

Bolt : Cross-Site Request Forgery Scanner

Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged.…

6 years ago

IP Obfuscator – Simple Tool to Social Engineer and Bypass Firewall

IP Obfuscator is a simple python script which converts an IP address into different obfuscated forms like integer, hexadecimal or…

6 years ago

Exrex : Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a…

6 years ago

PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually…

6 years ago

Adapt : A Tool To Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy,…

6 years ago

IdentYWAF : Blind WAF Identification Tool

identYwaf is an identification tool that can recognise web protection type (i.e. WAF) based on blind inference. Blind inference is being…

6 years ago

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated…

6 years ago

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan.…

6 years ago

Killcast : Manipulate Chromecast Devices in your Network

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only,…

6 years ago

Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues…

6 years ago