Kali Linux

Trape – People Tracker On The Internet

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in…

6 years ago

Skiptracer – OSINT Python Webscaping Framework

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining…

6 years ago

Janusec – Golang Based Application Security Solution Which Provides WAF

Janusec Application Gateway, an application security solutions which provides WAF (Web Application Firewall), unified web administration portal, private key protection,…

6 years ago

Sheepl – Creating Realistic User Behaviour For Supporting Tradecraft Development Within Lab Environments

Sheepl is a tool for creating realistic user behaviour for supporting tradecraft development within lab environments. There are lots of…

6 years ago

ZIP File Raider – Burp Extension for ZIP File Payload Testing

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily…

6 years ago

NodeJsScan – Static Security Code Scanner For Node.js Applications

NodeJsScan is a static security code scanner (SAST) for Node.js applications. Configure & Run Install Postgres and configure SQLALCHEMY_DATABASE_URI in…

6 years ago

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis Of Malicious Documents

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph,…

6 years ago

Ache – Web Crawler For Domain-Specific Search

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to…

6 years ago

SSH Auditor – Scan For Weak SSH Passwords On Your Network

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check…

6 years ago

Hassh : Tool Used To Identify Specific Client & Server SSH Implementations

HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…

6 years ago