Kali Linux

Dep-Scan : Fully Open-Source Security Audit For Project Dependencies

dep-scan is a fully open-source security audit tool for project dependencies based on known vulnerabilities, advisories and license limitations. Both…

3 years ago

Http-Desync-Guardian – Analyze HTTP Requests To Minimize Risks Of HTTP Desync Attacks

Http-Desync-Guardian is to Analyze HTTP Requests To Minimize Risks Of HTTP Desync Attacks. HTTP/1.1 went through a long evolution since 1991…

3 years ago

Pip-Audit : Audits Python Environments And Dependency Trees For Known Vulnerabilities

pip-audit is a tool for scanning Python environments for packages with known vulnerabilities. It uses the Python Packaging Advisory Database (https://github.com/pypa/advisory-database)…

3 years ago

goCabrito : Super Organized And Flexible Script For Sending Phishing Campaigns

goCabrito is a super organized and flexible script for sending phishing campaigns. Features Sends to a single emailSends to lists…

3 years ago

ReFlutter : Flutter Reverse Engineering Framework

ReFlutter framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled…

3 years ago

Driftwood : Private Key Usage Verification

Driftwood is a tool that can enable you to lookup whether a private key is used for things like TLS…

3 years ago

Inject-Assembly : Inject .NET Assemblies Into An Existing Process

Inject-Assembly is an alternative to traditional fork and run execution for Cobalt Strike. The loader can be injected into any…

3 years ago

Registry-Spy : Cross-platform Registry Browser For Raw Windows Registry Files

Registry-Spy is a free, open-source cross-platform Windows Registry viewer. It is a fast, modern, and versatile explorer for raw registry…

3 years ago

Token Universe : An Advanced Tool For Working With Access Tokens And Windows Security Policy

Token Universe is an advanced tool that provides a wide range of possibilities to research Windows security mechanisms. It has a convenient…

3 years ago

Iptable_Evil : An Evil Bit Backdoor For Iptables

Iptable_Evil is a very specific backdoor for iptables that allows all packets with the evil bit set, no matter the firewall rules. The…

3 years ago