Pentesting Tools

3proxy – Features, Installation, And Usage Guide

The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…

3 months ago

Sippts – The Comprehensive Guide To Auditing VoIP Security via SIP Protocol

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python…

3 months ago

Version 3.7 – Comprehensive Enhancements And New Features In SQL Server Chain Execution Tool

Complete refactor of code base. Updated documentation (code comments, README, and wiki) Execution against a linked SQL server chain. For…

3 months ago

Snaffler Output File Parser – Enhancing Data Analysis With Advanced Features

Especially in large environments, the Snaffler output gets very large and time-consuming to analyze. This script parse the Snaffler output…

3 months ago

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

3 months ago

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

3 months ago

Project Apeman : A Comprehensive Guide To Graph-Based AWS Security Analysis

Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based…

3 months ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

4 months ago

Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing

Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing…

4 months ago

Lemma – Harnessing AWS Lambda For Scalable Command-Line Tool Execution

The author of this project is not responsible for any damage or data loss incurred as a result of using…

4 months ago