Friday, April 19, 2019

Security Hacker

Home Security Hacker
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database....
Psad

Psad : Intrusion Detection & Log Analysis with IPtables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld...
BoNeSi

BoNeSi – The DDoS Botnet Simulator

BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a tested environment on the...
Lynis

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others....

Goscan : Interactive Network Scanner

GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap.
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious Hosts

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so...
IoT Home Guard

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

IoT Home Guard is a project to help people discover malware in smart home devices.

Must Need

Headless Burp

Headless Burp – Automate security tests using Burp Suite

Headless Burp provides an extension to Burp that allows you to run Burp Suite's Spider and Scanner tools in headless mode via command-line. However, it...
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled into a single executable...
Burpsuite Extensions

Burpsuite Extensions – A collection of Burp Suite extensions

A collection of BurpSuite extensions. Burpsuite Extensions gunziper A plugin for the burpsuite (https://portswigger.net/burp/) which enables you to "unpack" requests/responses (e.g. do an base64decode and afterwards...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
Noisy

Noisy – Simple random DNS, HTTP/S Internet Traffic Noise Generator

Noisy is a simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...