Malice : VirusTotal Wanna Be – Now with 100% more Hipster
Malice mission is to be a free open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500 company. Try It Out DEMO: demo.malice.ioUsername: malicePassword: ecilam Also Read : CIRTKit : Tools for the Computer Incident Response Team Installation $ brew install maliceio/tap/malice Usage: malice COMMAND Open Source Malware Analysis FrameworkVersion: 0.3.11Author:...
ADAPT : Tool That Performs Automated Penetration Testing for WebApps
ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed, and confidence in penetration testing efforts. ADAPT automatically tests for multiple industry standard OWASP Top 10 vulnerabilities, and outputs categorized findings based on these potential vulnerabilities. ADAPT also uses the functionality from OWASP ZAP to perform automated...
Pwndb : Search For Leaked Credentials
Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name. Usage usage: pwndb.py optional arguments: -h, --help show this help message and exit --target TARGET Target email/domain to search for leaks. --list LIST ...
PF_RING : High-Speed Packet Processing Framework
PF_RING is a Linux kernel module and user-space framework that allows you to process packets at high-rates while providing you a consistent API for packet processing applications. Basically everyone who has to handle many packets per second. The term ‘many’ changes according to the hardware you use for traffic analysis. It can range from 80k pkt/sec on a...
CIRTKit : Tools for the Computer Incident Response Team
CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the Viper Framework. Installation Database Setup lib/core/database.py It requires a database to store malware artifacts and investigation data. Currently, it is equipped to use SQLite and Postgres SQL databases. If you need to have multiple analysts collaborate on investigations, then you need...
Modlishka : A Flexible And Powerful Reverse Proxy Tool
Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased with an aim to: Help penetration testers to carry out an effective phishing campaign and reinforce the fact that serious threat can arise from phishing.Show current 2FA weaknesses, so adequate security solutions can be created and implemented soon.Raise...
Windows 95 : Windows 95 in Electron That Runs on macOS, Linux, and Windows
This is Windows 95, running in an Electron app, which runs on macOS, Linux, and Windows. Bear in mind that this is written entirely in JavaScript, so please adjust your expectations. Before you can run this from source, you'll need the disk image. It's not part of the repository, but you can grab it using the Show Disk Image button...
Fwknop : Single Packet Authorization Port Knocking
Fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which is encrypted, non-replayable, and authenticated via an HMAC in order to communicate desired access to a service that is hidden behind a firewall in a default-drop filtering stance. The main application of SPA is to use a...
GoScan : Interactive Network Scanner 2019
GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. GoScan can now be used to perform host discovery, port scanning, and service enumeration not only in situations where being stealthy is not a priority and time is limited (think at CTFs, OSCP, exams, etc.), but also (with a few tweaks...
nDPI : Open Source Deep Packet Inspection Software Toolkit
nDPI is an open source LGPLv3 library for deep-packet inspection. Based on OpenDPI it includes ntop extensions. We have tried to push them into the OpenDPI source tree but nobody answered emails so we have decided to create our own source tree. Also Read :Bincat : Binary Code Static Analyser With IDA Integration How To Compile nDPI In order...