The next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks …
Kubestriker – A Blazing Fast Security Auditing Tool For Kubernetes
Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are …
Sub404 – A Python Tool To Check Subdomain Takeover Vulnerability
Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it …
Writehat – A Pentest Reporting Tool Written In Python
HTML…” name=”twitter:description”> HTML…” name=”description”> HTML…” property=”og:description”> WriteHat is a reporting tool which removes Microsoft Word (and many hours of suffering) …
HiddenEyeReborn – HiddenEye With Completely New Codebase And Better Features Set
HiddenEye: Reborn is my second try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE has mainly phishing …
packetStrider – A Network Packet Forensics Tool For SSH
packetStrider for SSH is a packet forensics tool that aims to provide valuable insight into the nature of SSH traffic, …
uEmu – Tiny Cute Emulator Plugin For IDA Based On Unicorn.
uEmu is a tiny cute emulator plugin for IDA based on unicorn engine. Supports following architectures out of the box: …
CertEagle – Asset monitoring utility using real time CT log feeds
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or …
SharpSphere – .NET Project For Attacking vCenter
SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. …
Threatspec – Continuous Threat Modeling, Through Code
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat …