BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate …
TokenBreaker – JSON RSA To HMAC And None Algorithm Vulnerability POC
Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None Algorithm RSAtoHMAC Refer to this link about …
Fsociety – A Modular Penetration Testing Framework
Install pip install fsociety Update pip install –upgrade fsociety Usage usage: fsociety [-h] [-i] [-s] A Penetration Testing Framework optional …
Astsu – A Network Scanner Tool
How it works Scan common ports Send a TCP Syn packet to the destination on the defined port, if the …
RepoPeek – A Python Script To Get Details About A Repository Without Cloning It
RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using …
TorghostNG – Make All Your Internet Traffic Anonymized Through Tor Network
TorghostNG is a tool that make all your internet traffic anonymized through Tor network.Rewritten from TorGhost with Python 3.TorghostNG was …
Generator-Burp-Extension – Everything You Need About Burp Extension Generation
Everything You Need About Burp Extension Generation InstallationFirst, install Yeoman and generator-burp-extension using npm (we assume you have pre-installed node.js). …
OSSEM – A Tool To Assess Data Quality
A tool to assess data quality, built on top of the awesome OSSEM project. Mission Answer the question: I want …
Thoron Framework – Tool To Generate Simple Payloads To Provide Linux TCP Attack
About Thoron Framework Thoron Framework is a Linux post-exploitation framework that exploit Linux tcp vulnerability to get shell-like connection. Thoron …
Runtime Mobile Security (RMS) – A Powerful Web Interface That Helps You To Manipulate Android Java Classes And Methods At Runtime
Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes …