During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later …

During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later …
Documentation What is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous …
This tools is very helpful for finding vulnerabilities present in the Web Applications. A web application scanner explores a web …
Nidhogg is a multi-functional rootkit for red teams. The goal of Nidhogg is to provide an all-in-one and easy-to-use rootkit …
Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a …
Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many of the API key, allowing to …
IoT Malware Similarity Analysis Platform View Demo This project provides IoT malware similarity analysis based on shared codes. It helps …
Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Installing …
DcRat is a simple remote tool written in C# Introduction Features TCP connection with certificate verification, stable and security Server …
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. …