Smersh : A Pentest Oriented Collaborative Tool

0

Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport. Preview Front Documentation All information is available at the following address: https://docs.smersh.app How to contribute ? Just fork repository then create branch, work and push your content + create PR git checkout -b MyBranchgit add -pgit commit -m "xx"git push origin MyBranch Download

Scrummage : The Ultimate OSINT And Threat Hunting Framework

0

Scrummage is an OSINT tool that centralises search functionality from powerful, yet simple OSINT sites. This project draws inspiration mainly from two other projects, including: The Scumblr project, which while is now deprecated, inspired this concept.The OSINT Framework project, which is a visualisation tool, depicting a range of sites that can be used to search for a variety of things. While at first glance the...

pFuzz : Helps Us To Bypass Web Application Firewall By Using Different Methods At The Same Time

0

pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web application firewall by using different methods at the same time. pFuzz web uygulama araştırmaları için geliştirdiğimiz, gelişmiş bir fuzzing aracıdır. Farklı güvenlik uygulamaları üzerinde çeşitli saldırı yöntemlerinin denenmesi konusunda süreci hızlandırmak için geliştirilmiştir. Description pFuzz is a tool developed in the...

Guide to Relational Databases

0

Databases have been used by various organizations to solve business problems for a very long time. In the early days, databases used to be flat files, which meant that data was stored in flat files. However, this approach made it difficult to search for information or generate specific reports from a set of fields.  To resolve these concerns, a relational...

CarPunk : The Car Hacking Toolkit

0

CarPunk IS VERY SIMILAR TO CANghost, ONLY THE DEFFERENCE IS, IT COMES WITH OPTIONS TO ENABLE OR DISABLE INTERFACE AND BASIC SNIFFING AS EXTRA. IT WORKS ON BOTH SIMULATION & REAL CARS.HAS THE OPTIONS TO RECORD AND PLAY THE CAN PACKETS.NO ANY ARGUMENTS REQUIRED WHEN RUNNING BUT NEED CHANGES(Interface & Name for logfile), IF YOU'RE TRYING IN REAL-WORLD.TESTED ON UBUNTU...

BurpCrypto : A Collection Of Burpsuite Encryption Plug-Ins, Support AES/RSA/DES/ExecJs(execute JS Encryption Code In Burpsuite)

0

Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Build $ mvn package Usage 中文使用说明 Download the precompiled jar package from Releases.Add this jar package to your burpsuite's Extensions.Switch to BurpCrypto tab, select you need Cipher tab.Set key or some value.press "Add processor", and give a name for this processor.Switch to Intruder->Payloads->Payload Processing.press "Add", select "Invoke Burp extension", and...

efiXplorer : IDA Plugin For UEFI Firmware Analysis And Reverse Engineering Automation

0

efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: everytime we focus on last versions of IDA and Decompiler because we try to use most recent features from new SDK releases. That means we tested only on recent versions of Hex-Rays products and do not guarantee stable work on previous generations. Why not IDApython: all code...

Bopscrk : Tool To Generate Smart And Powerful Wordlists

0

bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists for targeted attacks. Targeted-attack wordlist creator: introduce personal info related to target, combines every word and transforms results into possible passwords. The lyricpass module allows to search lyrics related to artists and include them to the wordlists.Customizable case and leet transforms: create custom charsets and transforms patterns trough a simple config file.Wordlists exclusion: Exclude words from another wordlist (to avoid passwords...

AutomatedLab : A Provisioning Solution And Framework That Lets You Deploy Complex Labs On HyperV And Azure With Simple PowerShell Scripts

0

AutomatedLab (AL) enables you to setup test and lab environments on Hyper-v or Azure with multiple products or just a single VM in a very short time. There are only two requirements you need to make sure: You need the DVD ISO images and a Hyper-V host or an Azure subscription. Requirements Apart from the module itself your system needs to...

JSPanda : Client-Side Prototype Pollution Vulnerability Scanner

0

JSpanda is client-side prototype pollution vulnerability scanner. It has two key features, scanning vulnerability the supplied URLs and analyzing the JavaScript libraries' source code. However, JSpanda cannot detect advanced prototype pollution vulnerabilities. How JSPanda works? Uses multiple payloads for prototype pollution vulnerability.Gathers all the links in the targets for scanning and add payloads to JSpanda-obtained URLs, navigates to each URL with headless...