Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store …
Labtainers – A Docker-based Cyber Lab Framework
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or …
Mitmproxy2Swagger – Automagically Reverse-Engineer REST APIs Via Capturing Traffic
A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs …
BinAbsInspector – Vulnerability Scanner For Binaries
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a …
LEAF – Linux Evidence Acquisition Framework
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality …
Pocsploit – A Lightweight, Flexible And Novel Open Source Poc Verification Framework
pocsploit is a lightweight, flexible and novel open source poc verification framework Pain points of the POC framework in the …
Frida-Ios-Hook – A Tool That Helps You Easy Trace Classes, Functions, And Modify The Return Values Of Methods On iOS Platform
A tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return …
Tornado – Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Portforwarding
anonymously reverse shell over onion network using hidden services without portfortwarding Explore the docs fully undetectable reverse shell · View …
Frelatage – The Python Fuzzer That The World Deserves
pip3 install frelatageCurrent release : 0.0.7 Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python …
RedTeam-Physical-Tools – Red Team Toolkit – A Curated List Of Tools That Are Commonly Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry
Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry. In this list I decided to …