PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on...
PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...
PacVim – A Game That Teaches You Vim Commands
PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner. In spite of the fact...
CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming
CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn;
Fire up the VM
git clone https://github.com/0xM3R/cgPwn
cd...
Introspy-iOS : Security Tool For Profiling iOS Application at Runtime
Introspy-iOS is a blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
HABU – Network Penetration Testing Toolkit for Hackers and Pentesters
Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
WebvulScan – Web Application Vulnerability Scanner
WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or...
SIPI – Simple IP Information Tools for Reputation Data Analysis
SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do...
Idisagree – Control Remote Computers Using Discord Bot & Python 3
Idisagree is a tool to Control remote computers using discord bot and python 3. If your target is a windows system, you may want...
CTF – Some Setup Scripts For Security Research Tools
CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
XssPy – Web Application XSS Scanner
XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty...