Scrounger – Mobile Application Testing Toolkit
Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...
Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API
Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
theZoo – A Repository Of LIVE Malwares For Your Own Joy & Pleasure
theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis to have access to live malware, analyses...
WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques
WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
Nemesis – A Command Line Network Packet Crafting & Injecting Utility
The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken...
Tool-X : Kali Linux Hacking Tool Installer
Tool-X is a Kali linux hacking Tool installer, with the help of it you can install best hacking tools in Rooted or Non Rooted...
Leaked – A Checking Tool For Hash Codes And Passwords Leaked
A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3.
Leaked Features
Check passwords
...
UploadScanner : HTTP file upload scanner for Burp Proxy
UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every...
Darling – Darwin/Mac OS Emulation Layer For Linux
Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment.
Download Darling
Darling uses many Git...
GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...