Goca : Scanner Used To Find Metadata & Hidden Information
Goca is a FOCA fork written in Go, which is a tool used mainly to find metadata and hidden information in the documents its scans. These documents may be on web pages, and can be downloaded and analyzed with the scanner. It is capable of analyzing a wide variety of documents, with the most common being Microsoft...
Turbinia : Automation and Scaling of Digital Forensics Tools
Turbinia is an open-source framework for deploying, managing, and running distributed forensic workloads. It is intended to automate running of common forensic processing tools (i.e. Plaso, TSK, strings, etc) to help with processing evidence in the Cloud, scaling the processing of large amounts of evidence, and decreasing response time by parallelizing processing where...
Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration Testing Tool
Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. FEATURES Automatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with almost 100 auto-scheduled scripts)Easy to use graphical interface with...
Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without Rebooting
Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running GNU/Linux distribution (without cd-rom, flash and other). Via SSH, without rebooting. Also Read : Cuteit – IP Obfuscator Made to Make a Malicious IP a Bit Cuter How it works? Set your archive with system backup to...
RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry
rpi hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate sending commands/payloads to them. Also Read - VSHG : A Standalone Addon for GnuPG Installation Install dependencies: sudo pip install -U argparse termcolor and sudo apt -y install arp-scan tshark sshpassDownload rpi-hunter: git clone https://github.com/BusesCanFly/rpi-hunterNavigate to rpi-hunter: cd ./rpi-hunterMake...
Calculator : A simple Yet Powerful Calculator that Ships with Windows
The Windows Calculator app is a modern Windows app written in C++ that ships pre-installed with Windows. The app provides standard, scientific, and programmer calculator functionality, as well as a set of converters between various units of measurement and currencies. It ships regularly with new features and bug fixes. You can get the latest version of Calculator in the Microsoft...
Cuteit – IP Obfuscator Made to Make a Malicious IP a Bit Cuter
Cuteit IP obfuscator made to make a malicious ip a bit cuter. A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload. All of that is simply done with obfuscating ip...
Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable Even With The Most Common 32 bit Metasploit Payload
Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use of modules focused on polymorphic...
imago Forensics : A Python Tool That Extract Digital Evidences From Images
Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If you need to extract digital evidences and you have a lot of images, through this tool you will be able to compare them easily. Imago allows to extract the evidences into a CSV file or in a...
VSHG : A Standalone Addon for GnuPG
VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetric encryption . It ( Very secure hash generator ) is a standalone Addon for GnuPG ( Gnu privacy guard ) . It is written as a shell script and is designed around the Unix/Linux filesystem...