Cloudquery extracts the configuration and metadata of your infrastructure and transforms it into a relational SQL database. This allows you…
StreamDivert is a tool to man-in-the-middle or relay in and outgoing network connections on a system. It has the ability…
JadedWraith is a Lightweight UNIX backdoor for ethical hacking. Useful for red team engagements and CTFs. Something I wrote a…
DongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and taint tracking algorithms to achieve universal…
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been…
PoW-Shield provides DDoS protection on OSI application layer by acting as a proxy that utilizes proof of work between the…
Haklistgen turns any junk text into a usable wordlist for brute-forcing. Installation go install github.com/hakluke/haklistgen@latest Usage Examples Scrape all words…
Reconky is a script written in bash to automate the task of recon and information gathering. This Bash Script allows…
Wordlistgen is a tool to pass a list of URLs and get back a list of relevant words for your…
AES256_Passwd_Store script securely encrypts or decrypts passwords on disk within a custom database file. It also features functionality to retrieve…