NoSQL scanner and injector. About Nosqli I wanted a better nosql injection tool that was simple to use, fully command line...
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts. Setup This tool is...
Evine is a simple, fast, and interactive web crawler and web scraper written in Golang. Evine is useful for a wide...
$ padding-oracle-attacker decrypt <url> b64:<ciphertext_b64> <block_size> <error> [options] $ padding-oracle-attacker encrypt <url> <plaintext> <block_size> <error> [options] $ padding-oracle-attacker encrypt <url> hex:<plaintext_hex>...
The KITT Penetration Testing Framework was developed as an open source solution for pentesters and programmers alike to compile the tools...
A Modular Penetration Testing Framework Install pip install fsociety Update pip install --upgrade fsociety Usage usage: fsociety [-h] [-i] [-s] A...
Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java,...
It doesn’t matter whether you’re a beginner or expert in software development, all developers need to understand and learn how to use...
If you love to work on open-source or collaborating projects, you must have used GitHub for hosting your code on a remote...
Penta is is Pentest automation tool using Python3. (Future!) It provides advanced features such as metasploit and nexpose to extract vuln...
We all have to search through text files for strings from time to time. But what about when you need to search...
Linux and other UNIX-like operating systems have many tools for processing text on the command line. Without these tools (find complete Linux command...
QuarkslaB Dynamic binary Instrumentation (QBDI) is a modular, cross-platform and cross-architecture DBI framework. It aims to support Linux, macOS, Android, iOS and...
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim’s machine, a controler, running on any machine,...
Short Bytes: Linux distributions can leverage an extensive range of commands to accomplish various tasks. For most Linux distros, Bash (bourne again...
Short Bytes: Command output, and input, can be controlled in extremely flexible ways using pipes and redirection. This is much more than...
Last time we discussed the Linux Directory Structure and the roles of the various directories that form a part of the Linux...