DVHMA – Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities
Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. Its purpose
Read MoreDamn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. Its purpose
Read MoreΝέο Hashcat 4.1.0: Το Ηashcat είναι ένα από τα γρηγορότερα εργαλεία παραβίασης κωδικών πρόσβασης που χρησιμοποιεί GPU για να “αποκωδικοποιεί”
Read MoreDr. Mine is a node script written to aid automatic detection of in-browser cryptojacking. The most accurate way to
Read MoreDependency-Check is a utility that attempts to detect publicly disclosed vulnerabilities contained within project dependencies. It does this by
Read MoreAgrigento Agrigento is based on black-box differential analysis, and it works in two steps: first, it establishes a baseline of
Read MorePcapXray is a Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram including device identification, highlight
Read MoreBlackWidow is a python based web application spider to gather subdomains, URL’s, dynamic parameters, email addresses and phone numbers from
Read MoreFinsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository
Read MoreCommand line script for automating metasploit functions: Checks for metasploit service and starts if not present Easily craft meterpreter reverse_tcp
Read MoreMADLIRA is a tool for Android malware detection. It consists in two components: TFIDF component and SVM learning component. In
Read MoreA collection of Burpsuite Intruder payloads and fuzz lists and pentesting methodology. To pull down all 3rd party repos, run
Read MoreWe are excited to announce this major release of auditing tool Lynis. Several big changes have been made to
Read MoreTitanHide is a driver intended to hide debuggers from certain processes. The driver hooks various Nt* kernel functions (using SSDT
Read Moreroxysploit is a community-supported, open-source and penetration testing suite that supports attacks for numerous scenarios. conducting attacks in the field. Some
Read MoreA BLE scanner for “smart” devices hacking based on the bluepy library, dead easy to use because retarded devices should
Read MoreKali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our
Read MoreGrouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins) which
Read MoreDamn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to
Read MoreIDA plugin for reverse-engineering and dynamic interactions with the Binsec platform Features Decoding an instruction (in DBA IR) Loading execution
Read MoreA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 3200 malicious cryptocurrency mining domains
Read MoreLuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the
Read Morebettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler,
Read MoreWe are excited to announce this major release of auditing tool Lynis. Several big changes have been made to
Read MoreNSE script based on Vulners.com API. NSE script using some well-known service to provide info on vulnerabilities. Dependencies: nmap libraries:
Read MoreIt’s an API for SQLmap tamper scripts allows you to use your favorite programming language to write your tamper
Read MoreWeb Shell Detector is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a
Read Moreal-khaser is a PoC “malware” application with good intentions that aims to stress your anti-malware system. It performs a bunch
Read More