Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals
Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps
Read MoreCyber security tools.
Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps
Read MorePown Recon Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead
Read MoreBloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell
Read MoreOWASP Juice Shop OWASP Juice Shop is an intentionally insecure web app for security training written entirely in Javascript which
Read MoreFramework for Testing WAFs (FTW) Purpose This project was created by researchers from ModSecurity and Fastly to help provide rigorous
Read Moreehtools framework Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of
Read MoreShodan Shodan, the official definition of himself Computer Search Engine (Computer Resource Search Engine), is American man John Mase Li
Read MoreZombie Ant Farm: A Kit For Playing Hide and Seek with Linux EDRs Why? Because monolithic offensive tools are never
Read MoreToday we introduce two batches of test injection point skills, this method can also be used for another FUZZ test.
Read MoreShodan Eye This tool collects all information about all devices that are directly connected to the internet with the specified
Read MoreFirmware Slap Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap
Read MoreVirtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs RedHunt OS aims to be a one stop shop
Read MoreThe OWASP Zed Attack Proxy (ZAP) is easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
Read MoreCyberChef The Cyber Swiss Army Knife CyberChef is a simple, intuitive web app for carrying out all manner of “cyber”
Read Moreobjection Runtime Mobile Exploration introduction – objection Runtime Mobile Exploration objection is a runtime mobile exploration toolkit, powered by Frida. It was built
Read Morepocsuite3 pocsuite3 is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team. It comes with
Read MoreExpliot (Pronounced – expl-aa-yo-tee) Internet Of Things Exploitation Framework Expliot is a framework for security testing IoT and IoT infrastructure.
Read MoreEMAGNET Emagnet is a very powerful tool for its purpose which is to capture email addresses and passwords from leaked
Read Moresn0int sn0int is an OSINT framework and package manager. It was built for IT security professionals and bug hunters to
Read MoreThe OWASP Zed Attack Proxy (ZAP) is easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
Read MoreSudomy Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in a
Read MoreExpliot (Pronounced – expl-aa-yo-tee) Internet Of Things Exploitation Framework Expliot is a framework for security testing IoT and IoT infrastructure.
Read MoreAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application
Read Moreobjection Runtime Mobile Exploration introduction – objection Runtime Mobile Exploration objection is a runtime mobile exploration toolkit, powered by Frida. It was built
Read MorePlatypus A modern multiple reverse shell sessions/clients manager via terminal written in go Features Multiple services listening port Multiple client
Read MoreSecurity Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log
Read MorePrior to an attack, the penetration tester should know as much as possible about the target environment and the characteristics
Read Morelinux-smart-enumeration Linux enumeration tools for pentesting and CTFs This project was inspired by LinEnum and uses many of its tests.
Read MoreThe Universal Radio Hacker (URH) is a tool for analyzing unknown wireless protocols. With the rise of the Internet of
Read MoreCovenant Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the
Read More