DataSurgeon (ds) is a versatile tool designed for incident response, penetration testing, and CTF challenges. It allows for the extraction …
Thunderstorm – Modular Framework To Exploit UPS Devices
Thunderstorm is a modular framework to exploit UPS devices. For now, only the CS-141 and NetMan 204 exploits will be …
Cortex-XDR-Config-Extractor – Cortex XDR Config Extractor
This tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool …
X-force – IBM Security Utilitary Library In Python. Search And Query All Sources: Threat_Activities And Groups, Malware_Analysis, Industries
IBM Security X-FORCE Exchange library in Python 3. Search: threat_activities, threat_groups, malware_analysis, collector and industries. pip3 install XForce Using you API_KEY make …
APKHunt – Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although …
IpGeo – Tool To Extract IP Addresses From Captured Network Traffic File
IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing …
SXDork – A Powerful Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet
SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. …
CVE-Vulnerability-Information-Downloader – Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List
Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security …
Tracgram – Use Instagram Location Features To Track An Account
Trackgram Use Instagram location features to track an account Usage At this moment the usage of Trackgram is extremly simple:1. …
Gmailc2 – A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions
This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is validbecause …