Sunday, July 5, 2020
Home Tags POC

Tag: POC

Must Need

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.
Subscraper

Subscraper – Tool That Performs Subdomain Enumeration Through Various Techniques

SubScraper uses DNS brute force, Google & Bing scraping, and Virus Total to enumerate subdomains without an API. Written in Python3, SubScraper performs HTTP(S)...
Terminus : A Terminal For A More Modern Age

Terminus : A Terminal For A More Modern Age

Terminus is a highly configurable terminal for a more modern age emulator for Windows, macOS and Linux. Theming and color...
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;

Idisagree – Control Remote Computers Using Discord Bot & Python 3

Idisagree is a tool to Control remote computers using discord bot and python 3. If your target is a windows system, you may want...
Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To...

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported...