Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store …
Labtainers – A Docker-based Cyber Lab Framework
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or …
Mitmproxy2Swagger – Automagically Reverse-Engineer REST APIs Via Capturing Traffic
A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs …
BinAbsInspector – Vulnerability Scanner For Binaries
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a …
LEAF – Linux Evidence Acquisition Framework
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality …
Chrome 102 Patches 32 Vulnerabilities
Google is preparing to promote Chrome 102 to take its place after releasing Chrome 101 just over a month ago. …
Pocsploit – A Lightweight, Flexible And Novel Open Source Poc Verification Framework
pocsploit is a lightweight, flexible and novel open source poc verification framework Pain points of the POC framework in the …
Frida-Ios-Hook – A Tool That Helps You Easy Trace Classes, Functions, And Modify The Return Values Of Methods On iOS Platform
A tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return …
Tornado – Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Portforwarding
anonymously reverse shell over onion network using hidden services without portfortwarding Explore the docs fully undetectable reverse shell · View …
Frelatage – The Python Fuzzer That The World Deserves
pip3 install frelatageCurrent release : 0.0.7 Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python …