Friday, November 15, 2019
Home Tags Goodware Analysis

Tag: Goodware Analysis

Must Need

Trivy :  Simple & Comprehensive Vulnerability Scanner

Trivy : Simple & Comprehensive Vulnerability Scanner

Trivy is a Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. A software vulnerability is a glitch, flaw,...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses. UAC-A-mola has...
Put2Win

Put2Win – Script To Automatize Shell Upload By PUT HTTP Method...

Put2Win is a script to automatize shell upload by PUT HTTP method to get meterpreter. It's necessary to have installed nmap and msfvenom tools...
SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator is an obfuscate a python code 2.x and 3.x. Takes a python source code and transform it into an obfuscated...