Security Hacker

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble managed and…

6 years ago

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes…

6 years ago

Psad : Intrusion Detection & Log Analysis with IPtables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code…

6 years ago

BoNeSi – The DDoS Botnet Simulator

BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a tested environment on the wire. It…

6 years ago

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an…

6 years ago

Goscan : Interactive Network Scanner

GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. Although it started as…

6 years ago

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to…

6 years ago

Hostintel : A Modular Python App to Collect Intelligence for Malicious Hosts

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence…

6 years ago

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project can…

6 years ago

Command Injection Payload List

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via…

6 years ago