Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate …
HackBot – A Simple Cli Chatbot Having Llama2 As Its Backend Chat AI
Welcome to HackBot, an AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also …
QuadraInspect – Android Framework That Integrates AndroPass, APKUtil, And MobFS, Providing A Powerful Tool For Analyzing The Security Of Android Applications
The security of mobile devices has become a critical concern due to the increasing amount of sensitive data being stored …
RESim – Reverse Engineering Software Using A Full System Simulator
Reverse engineering using a full system simulator. Dynamic analysis by instrumenting simulated hardware using Simics Trace process trees, system calls …
magicRecon – A Powerful Shell Script To Maximize The Recon And Data Collection Process Of An Objective And Finding Common Vulnerabilities
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common …
Awesome Android Security – A Curated List Of Android Security Materials And Resources For Pentesters And Bug Hunters
A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog How To’s Paper Books Course …
Inviteflood- Tool Used to Perform DOS Attack on VOIP Network
Inviteflood is a tool to perform SIP/SDP INVITE message flooding over UDP/IP to perform DOS Attack. This tool can be utilized to …
JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the …
SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation
Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and …
How to Perform Manual SQL Injection With Double quotes Error Based String Method
If you are trying to hack the databases with methods like single quotes error based injection, Integer based injection but the …