Wednesday, April 8, 2020

Security Hacker

Home Security Hacker
HUNT

HUNT – Burp Suite Pro/Free and OWASP ZAP Extensions

HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability...
Command Injection

Command Injection Payload List

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating...
IoT Home Guard

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

IoT Home Guard is a project to help people discover malware in smart home devices.
Phantom-Evasion

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable Even With The...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even...
Manticore

Manticore : Symbolic Execution Tool

Manticore is a symbolic execution tool for analysis of binaries and smart contracts. Beginning with version 0.2.0, Python 3.6+ is...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious Hosts

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...
MCExtractor

MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool

MCExtractor is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users...

Must Need

nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from it's first release, the...
Entropy : Set Of Tools To Exploit Netwave & GoAhead IP Webcams

Entropy : Set Of Tools To Exploit Netwave & GoAhead IP...

Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for...
Revshellgen : Reverse Shell Generator Written In Python

Revshellgen : Reverse Shell Generator Written In Python

Revshellgen is a standalone python script for generating reverse shells easily and automating the boring stuff like URL encoding the command and...
Python RAT

Stitch A Cross Platform Python Remote Administration Tool

This is a cross-platform python framework that permits you to create custom payloads for Windows, Mac OSX, and UNIX moreover. you're ready to choose...
Ninja : Open Source C2 Server Created For Stealth Red Team Operations

Ninja : Open Source C2 Server Created For Stealth Red Team...

Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without...
Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS

Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of CMS, fast cms detection,information gathering and vulnerabilities...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...