Decider – A Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework19 hours agoMarch 29, 2023ThunderCloud – Cloud Exploit Framework2 days agoMarch 28, 2023Waf-Bypass – Check Your WAF Before An Attacker Does3 days agoMarch 27, 2023Kali Linux 2023.1 – Penetration Testing and Ethical Hacking Linux Distribution4 days agoMarch 26, 2023Mimicry – Security Tool For Active Deception In Exploitation And Post-Exploitation5 days agoMarch 24, 2023APCLdr – Payload Loader With Evasion Features6 days agoMarch 23, 2023PortexAnalyzerGUI – Graphical Interface For PortEx, A Portable Executable And Malware Analysis Library7 days agoMarch 23, 2023Invoke-PSObfuscation – An In-Depth Approach To Obfuscating The Individual Components Of A PowerShell Payload Whether You’Re On Windows Or Kali LinuxMarch 21, 2023, 11:23 PMMarch 21, 2023NimPlant – A Light-Weight First-Stage C2 Implant Written In NimMarch 20, 2023, 9:46 PMMarch 20, 2023FindUncommonShares – A Python Equivalent Of PowerView’s Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows DomainsMarch 19, 2023, 9:26 PMMarch 19, 2023Ator, Downloads, Hacking Tools, Scanning, Taken, TokenAtor – Authentication Token Obtain and Replace ExtenderMarch 18, 2023, 10:52 PMMarch 18, 20230 37Aircrack Ng, Downloads, Hacking Tools, Kismet, Sqlite3, Wifi_Db, WiGLEWifi_Db – Script To Parse Aircrack-ng Captures To A SQLite DatabaseMarch 17, 2023, 9:29 PMMarch 17, 20230 42Chatgpt, Chatgpt Api, Downloads, GPT_Vuln-analyzer, Hacking Tools, Information Gathering, Nmap Api, OpenaiGPT_Vuln-analyzer – Uses ChatGPT API And Python-Nmap Module To Use The GPT3 Model To Create Vulnerability Reports Based On Nmap Scan DataMarch 17, 2023, 12:15 AMMarch 17, 20230 55Certstream, CertWatcher, Downloads, Hacking Tools, Security Tools, Vulnerability ScannersCertWatcher – A Tool For Capture And Tracking Certificate Transparency Logs, Using YAML Templates Based DSLMarch 15, 2023, 9:28 PMMarch 15, 20230 43Asn1Crypto, CertVerify, Codesign Scanner, Codesigned Detection, Downloads, File Scan, Hacking Tools, Leaked Certificate, Malware Detection, Malware Scanner, Security Scanners, Untrusted CertificateCertVerify – A Scanner That Files With Compromised Or Untrusted Code Signing CertificatesMarch 14, 2023, 8:52 PMMarch 14, 20230 41Downloads, Enumeration, Graphicator, GraphQL, Hacking ToolsGraphicator – A GraphQL Enumeration And Extraction ToolMarch 13, 2023, 9:02 PMMarch 13, 20230 39Downloads, Hacking Tools, MacOSThreatTrack, Malware DetectionMacOSThreatTrack – Bash Tool Used For Proactive Detection Of Malicious Activity On macOS SystemsMarch 8, 2023, 7:18 PMMarch 8, 20230 47CTF Tools, DataSurgeon, Downloads, File Search, Hacking Tools, Reconnaissance, Search Tools, Security ToolsDataSurgeon – Quickly Extracts IP’s, Email Addresses, Hashes, Files, Credit Cards, Social Secuirty Numbers And More From TextMarch 7, 2023, 8:27 PMMarch 7, 20230 46Downloads, Hacking Tools, Rce Exploit, Rce Scanner, ThunderstormThunderstorm – Modular Framework To Exploit UPS DevicesMarch 6, 2023, 11:09 PMMarch 6, 20230 50Cortex-XDR-Config-Extractor, Downloads, Hacking Tools, Red Team, SALT, Scan, Threat, WindowsCortex-XDR-Config-Extractor – Cortex XDR Config ExtractorMarch 5, 2023, 6:55 PMMarch 5, 20230 47Downloads, Hacking Tools, Threat Intelligence, X-force, XforceX-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, IndustriesMarch 4, 2023, 6:46 PMMarch 4, 20230 42Downloads, Hacking ToolsAPKHunt – Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS FrameworkMarch 1, 2023, 6:49 PMMarch 1, 20230 71Downloads, Geolocation, Hacking Tools, IpGeo, Kali, PythonIpGeo – Tool To Extract IP Addresses From Captured Network Traffic FileFebruary 28, 2023, 5:26 PMFebruary 28, 20230 217Downloads, Hacking Tools, Sensitive Information, SXDork, Uncover, WordPressSXDork – A Powerful Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The InternetFebruary 27, 2023, 4:45 PMFebruary 27, 20230 64CVE-Vulnerability-Information-Downloader, Downloads, Hacking Tools, Vulnerability, Vulnerability Scanner, Vulnerability ScannersCVE-Vulnerability-Information-Downloader – Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One ListFebruary 26, 2023, 4:30 PMFebruary 26, 20230 145Downloads, Hacking Tools, Python3, Tracgram, UsernameTracgram – Use Instagram Location Features To Track An AccountFebruary 25, 2023, 5:33 PMFebruary 25, 20230 82C2Server, Downloads, Fud Rat, Gmailc2, Googlec2, Hacking Tools, Linux Exploits, Redteaming, Smtprat, Windows ExploitationGmailc2 – A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic RestrictionsFebruary 24, 2023, 6:51 PMFebruary 24, 20230 112Bugbounty Tool, Downloads, Hacking Tools, Probable_Subdomains, Wordlist, WordlistsProbable_Subdomains – Subdomains Analysis And Generation Tool. Reveal The Hidden!February 23, 2023, 4:37 PMFebruary 23, 20230 111Bugbounty Tool, Downloads, Hacking Tools, Reverse Ip Scan, Reverseip_PyReverseip_Py – Domain Parser For IPAddress.com Reverse IP LookupFebruary 22, 2023, 7:21 PMFebruary 22, 20230 109Appsec, Burpsuite, Continuous Scanning, Devsecops, Downloads, Faraday, Hacking Tools, Nessus, Security Automation, Vulnerability ScannersFaraday – Open Source Vulnerability Management PlatformFebruary 21, 2023, 4:54 PMFebruary 21, 20230 91Downloads, Hacking Tools, Threat Hunting, ThreatHound, Windows, Windows Event LogsThreatHound – Tool That Help You On Your IR & Threat Hunting And CAFebruary 20, 2023, 5:34 PMFebruary 20, 20230 74Downloads, Hacking Tools, TLS, Upload_Bypass_Carnage, UsernameUpload_Bypass_Carnage – File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!February 19, 2023, 2:11 PMFebruary 19, 20230 91chisel, Csharp, Downloads, Hacking Tools, mimikatz, Redteam, shARP, vulnerabilities, WrapperOffensivePipeline – Allows You To Download And Build C# Tools, Applying Certain Modifications In Order To Improve Their Evasion For Red Team ExercisesFebruary 18, 2023, 2:01 PMFebruary 18, 20230 61Blueteam, Cyberintelligence, Downloads, Hacking Tools, Misp-Extractor, ThreatHuntingMisp-Extractor – Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)February 17, 2023, 2:40 PMFebruary 17, 20230 54Bugbounty, Downloads, Hacking Tools, Vulnerable Application, Web-Hacking-Playground, XSSWeb-Hacking-Playground – Web Application With Vulnerabilities Found In Real Cases, Both In Pentests And In Bug Bounty ProgramsFebruary 16, 2023, 2:01 PMFebruary 16, 20230 89Invoke-Transfer – PowerShell Clipboard Data TransferFebruary 15, 2023, 12:53 PMFebruary 15, 2023Email-Vulnerablity-Checker – Find Email Spoofing Vulnerablity Of DomainsFebruary 14, 2023, 12:16 PMFebruary 14, 2023DNSrecon-gui – DNSrecon Tool With GUI For Kali LinuxFebruary 13, 2023, 1:10 PMFebruary 13, 2023Powershell-Backdoor-Generator – Obfuscated Powershell Reverse Backdoor With Flipper Zero And USB Rubber Ducky PayloadsFebruary 12, 2023, 2:56 PMFebruary 12, 2023Leaktopus – Keep Your Source Code Under ControlFebruary 11, 2023, 10:46 AMFebruary 11, 2023C99Shell-PHP7 – PHP 7 And Safe-Build Update Of The Popular C99 Variant Of PHP ShellFebruary 10, 2023, 11:11 AMFebruary 10, 2023Darkdump2 – Search The Deep Web Straight From Your TerminalFebruary 9, 2023, 10:31 AMFebruary 9, 2023Heap_Detective – The Simple Way To Detect Heap Memory Pitfalls In C++ And CFebruary 7, 2023, 10:26 AMFebruary 7, 2023Winevt_Logs_Analysis – Searching .Evtx Logs For Remote ConnectionsFebruary 6, 2023, 1:21 PMFebruary 6, 2023EAST – Extensible Azure Security Tool – DocumentationFebruary 5, 2023, 11:02 AMFebruary 5, 2023Suborner – The Invisible Account ForgerFebruary 3, 2023, 10:56 AMFebruary 3, 2023Monomorph – MD5-Monomorphic Shellcode Packer – All Payloads Have The Same MD5 HashFebruary 2, 2023, 9:01 AMFebruary 2, 2023Sandfly-Entropyscan – Tool To Detect Packed Or Encrypt ed Binaries Related To Malware, Finds Malicious Files And Linux Processes And Gives Output With Cryptographic HashesFebruary 1, 2023, 10:24 AMFebruary 1, 2023DFShell – The Best Forwarded ShellJanuary 31, 2023, 7:54 AMJanuary 31, 2023Yaralyzer – Visually Inspect And Force Decode YARA And Regex Matches Found In Both Binary And Text Data, With ColorsJanuary 30, 2023, 7:41 AMJanuary 30, 2023Also ReadSSTImap – Automatic SSTI Detection Tool With Interactive InterfaceJanuary 29, 2023, 7:25 AMJanuary 29, 2023 120BlueHound – Tool That Helps Blue Teams Pinpoint The Security Issues That Actually MatterJanuary 28, 2023, 10:44 AMJanuary 28, 2023 112GUAC – Aggregates Software Security Metadata Into A High Fidelity Graph DatabaseJanuary 27, 2023, 9:20 AMJanuary 27, 2023 78DC-Sonar – Analyzing AD Domains For Security Risks Related To User AccountsJanuary 26, 2023, 10:59 AMJanuary 26, 2023 212Get-AppLockerEventlog – Script For Fetching Applocker Event Log By Parsing The Win-Event LogJanuary 25, 2023, 6:35 AMJanuary 25, 2023 120SQLiDetector – Helps You To Detect SQL Injection “Error Based” By Sending Multiple Requests With 14 Payloads And Checking For 152 Regex Patterns For Different DatabasesJanuary 24, 2023, 8:21 AMJanuary 24, 2023 111Popeye – A Kubernetes Cluster Resource SanitizerJanuary 23, 2023, 6:22 AMJanuary 23, 2023 79Tai-e – An Easy-To-Learn/Use Static Analysis Framework For JavaJanuary 22, 2023, 8:58 AMJanuary 22, 2023 79Ghauri – An Advanced Cross-Platform Tool That Automates The Process Of Detecting And Exploiting SQL Injection Security FlawsJanuary 21, 2023, 7:39 AMJanuary 21, 2023 1172.7kLikes1kFollowersWhoa, you love reading! Take a moment to join us on social media.