In the current cybersecurity landscape, the threats facing enterprises have evolved; and now highlight a growing level of sophistication in the methods...
This has only been tested on Kali.It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/Install the necessary Kali...
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company...
hashcobra Hash Cracking tool. Usage $ ./hashcobra -H--==[ hashcobra by sepehrdad ]==--usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> - hashing...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a small lab...
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz. Features Fast! Allows fuzzing of HTTP header...
According to ethical hacking specialists, two Romanian citizens have been sentenced to 20 years in prison for infecting more than 400,000 computer...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so...
Hundreds of things could go wrong after a ransomware victim pays the money demanded by criminals. Digital forensics specialists from security firm...
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane...
Currently any company can become a victim of a cyberattack. According to cybersecurity specialists, automobile company BMW detected and monitored a hacker...
ReconPi – A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.Start using that Raspberry Pi...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the...
functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based...
A CLI application that automatically prepares Android APK files for HTTPS inspection Inspecting a mobile app’s HTTPS traffic using a proxy is...
Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the...
Antbot.pw provides a free, open API endpoint for checking a domain or email address against a frequently-updated list of disposable domains. CORS...
A new report revealed by digital forensics specialists claims that hackers that make up the dangerous Lazarus group are trying to inject...
A group of vulnerability testing specialists from the University of New Mexico, made up of William J. Tolley, Beau Kujath and Jedidiah...
RetDec is a retargetable machine-code decompiler based on LLVM.The decompiler is not limited to any particular target architecture, operating system, or executable...