Kali Linux

Terra guard : Create And Destroy Your Own VPN Service Using Wire Guard

Terra guard's goal is to be simple to create and destroy your own VPN service using Wire Guard. Prerequisites Terraform >=…

4 years ago

Pathprober : Probe And Discover HTTP Pathname Using Brute-Force Methodology And Filtered By Specific Word Or 2 Words At Once

Pathprober is a Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at…

4 years ago

In0ri : Defacement Detection With Deep Learning

In0ri is a defacement detection system utilizing a image-classification convolutional neural network. Introduction When monitoring a website, In0ri will periodically…

4 years ago

TeamsUserEnum : User Enumeration With Microsoft Teams API

TeamsUserEnum, sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an…

4 years ago

PSTF2 : Passive Security Tools Fingerprinting Framework

PSTF2 is a Passive Security Tools Fingerprinting Framework. Have you ever wanted a simple, easy and stealth bypass for multiple…

4 years ago

Beanshooter : JMX Enumeration And Attacking Tool

Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints. Introduction JMX stands for Java Management Extensions and can…

4 years ago

Hash-Buster v3.0 : Crack Hashes In Seconds

Hash-Buster v3.0 is a tool to Crack Hashes In Seconds. Features Automatic hash type identificationSupports MD5, SHA1, SHA256, SHA384, SHA512Can…

4 years ago

Allsafe : Intentionally Vulnerable Android Application

Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like…

4 years ago

Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)

Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec…

4 years ago

Cyberstalkers: How to Protect Yourself

Modern-day communication technology is one of the most advanced and influential inventionsto affect humanity. However, it does have a dark…

4 years ago