security

Kali Linux 2021.3 Released for NetHunter Smartwatch and With New Hacking Tools

The most popular penetration testing distro Kali linux announced a new version that included extended support for OpenSSL, new Tools,…

3 years ago

PowerShell Armoury : A PowerShell Armoury For Security Guys And Girls

PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their engagements.…

3 years ago

PowerShell Armoury : A PowerShell Armoury For Security Guys And Girls

PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their engagements.…

3 years ago

Salus : Security Scanner Coordinator

Salus (Security Automation as a Lightweight Universal Scanner), named after the Roman goddess of protection, is a tool for coordinating the…

3 years ago

TotP-SSH-Fluxer : Take Security By Obscurity To The Next Level

Totp-Ssh-Fluxer will take Security By Obscurity To The Next Level. Some people change their SSH port on their servers so…

3 years ago

HookDump : Security Product Hook Detection

HookDump is a tool for security product hook detection. Building Source In order to build this you will need Visual…

4 years ago

KubeArmor : Container-aware Runtime Security Enforcement System

Introduction to KubeArmor KubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file…

4 years ago

Awesome Android Security

A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration…

4 years ago

Tsunami Security Scanner 2020

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high…

4 years ago

SGN : A Polymorphic Binary Encoder For Offensive Security Purposes

SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a…

4 years ago