Reverse APK – Quickly Analyze & Reverse Engineer Android Packages

0

Using Reverse APK you will have the option to quickly analyze and reverse engineer Android applications. FEATURES Of Reverse APK Displays all extracted files for easy reference Automatically decompile APK files to Java and Smali format Analyze AndroidManifest.xml for common vulnerabilities and behavior Static source code analysis for common vulnerabilities and behavior Device info Intents Command execution SQLite references Logging...

CMSeeK – CMS Detection And Exploitation Suite

0

CMSeeK is a CMS detection and exploitation suite where you can Scan WordPress, Joomla, Drupal and 100 other CMSs. CMS or content management system manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Use Of CMSeek Basic CMS Detection of over 80 CMS Drupal version detection Advanced Wordpress Scans Detects Version User Enumeration ...

WAF-Buster : Disrupt WAF by abusing SSL/TLS Ciphers

0

WAF-buster tool was created to Analyze the ciphers that are supported by the Web application firewall being used at the web server end. It works by first triggering SslScan to look for all the supported ciphers during SSL/TLS negotiation with the web server.After getting the text file of all the supported ciphers, then we use Curl to query web...

Vim Wasm – Vim Editor Ported To WebAssembly

0

Vim Wasm project is running Vim editor on browser by compiling Vim C sources into WebAssembly. Notices Please access from a desktop browser (Chrome/Firefox/Safari/Edge). Safari seems the best on macOS. Please avoid slow networks. Your browser will fetch total of around 1MB files. vim.wasm takes key inputs from DOM keydown event. Please disable your browser extensions which affect key inputs...

GitMiner – Tool For Advanced Mining For Content On Github

0

GitMiner is a Advanced search tool and automation in Github. This tool aims to facilitate research by code or code snippets on github through the site's search page. GitMiner Requirements lxml requests argparse json re Installation $ git clone http://github.com/UnkL4b/GitMiner $ cd GitMiner ~/GitMiner $ pip3 install -r requirements.txt Docker $ git clone http://github.com/UnkL4b/GitMiner $ cd GitMiner $ docker build -t gitminer . $ docker run -it gitminer -h Also...

Easyssh – The SSH Connection Manager To Make Your Life Easier

0

Easyssh is a complete, efficient and easy-to-use manager. Create and edit connections, groups, customize the terminal, with multiple instances of the same connection. Easyssh Features Manage connections and groups Customize terminal Dark Theme Multiple instances of same connection Restore opened hosts Sync ~/.ssh/config Also Read Archery – Open Source Vulnerability Assessment & Management Helps Developers & Pentesters To Perform Scans & Manage...

Archery – Open Source Vulnerability Assessment & Management Helps Developers & Pentesters To Perform Scans & Manage Vulnerabilities

0

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource tools to perform comprehensive scanning for web application and network. Archery Requirement Python 2.7 OpenVas 8, 9 OWASP ZAP 2.7.0 Selenium Python Firefox Web driver Start Application $ python manage.py runserver 0.0.0.0:8000 Installation $ git clone https://github.com/archerysec/archerysec.git $ cd archerysec $ chmod...

BootStomp – A Bootloader Vulnerability Bug Finder

0

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage vulnerabilities. BootStomp works with boot-loaders compiled for ARM architectures (32 and 64 bits both) and that results might slightly vary depending on angr and Z3's versions. Requirements angr $ pip install angr IDA PRO IDA Decompiler Run BootStomp...

Trape – Learn To Track The World & To Avoid Being Traced

0

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies could monitor you, obtaining information beyond your IP. Also Read XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool Session Recognized Using Trape Facebook Twitter VK Reddit Gmail tumblr Instagram Github Bitbucket Dropbox Spotify PayPal Amazon Foursquare (new) ...

Anti-DDoS : Anti DDOS Bash Script To Defend Against DDOS Attacks

0

An open source project developed against the DOS and DDoS attack by writing iptables rules into the Linux OS is called the Anti-DDoS project. We need to make sure before implementing or executing the rules take all necessary defense configurations. The anti-DDoS project will work only on Linux OS, it will not provide 100% security, but it helps you to...