Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great …
Erlik 2 – Vulnerable-Flask-App
Erlik 2 – Vulnerable-Flask-App Tested – Kali 2022.1 Description It is a vulnerable Flask Web App. It is a lab …
Psudohash – Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by …
Bayanay – Python Wardriving Tool
WarDriving is the act of navigating, on foot or by car, to discover wireless networks in the surrounding area. Features …
Deadfinder – Find Dead-Links (Broken Links)
Dead link (broken link) means a link within a web page that cannot be connected. These links can have a …
Pmanager – Store And Retrieve Your Passwords From A Secure Offline Database. Check If Your Passwords Has Leaked Previously To Prevent Targeted Password Reuse Attacks
Demo Description Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to …
SpyCast – A Crossplatform mDNS Enumeration Tool
SpyCast is a crossplatform mDNS enumeration tool that can work either in active mode by recursively querying services, or in …
pyFlipper – Unoffical Flipper Zero Cli Wrapper Written In Python
Unoffical Flipper Zero cli wrapper written in Python Functions and characteristics: Setup instructions: $ git clone https://github.com/wh00hw/pyFlipper.git$ cd pyFlipper$ python3 …
SharpNamedPipePTH – Pass The Hash To A Named Pipe For Token Impersonation
This project is a C# tool to use Pass-the-Hash for authentication on a local Named Pipe for user Impersonation. You …
PSAsyncShell – PowerShell Asynchronous TCP Reverse Shell
PSAsyncShell is an Asynchronous TCP Reverse Shell written in pure PowerShell. Unlike other reverse shells, all the communication and execution …