Depix is a tool for recovering passwords from pixelized screenshots. This implementation works on pixelized images that were created with a...
Security Incident Response Automated Simulations (SIRAS) are internal/controlled actions that provide a structured opportunity to practice the incident response plan and...
Ping, but with a graph. Install FYI: The old Python version can be found under the python tag. Homebrew (MacOS +...
TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling, especially...
A powerful XSS scanner made in python 3.7 Installing Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands:...
Recently, the Evilnum APT group used the Python-based RAT PyVil tool to spy and steal sensitive data; here, the main motive of...
This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility Framework...
Automatically scan for publically accessible webcams around the internet Usage python MJPG.py : for public MJPG streamers around the internet python...
IRFuzz is a simple scanner with yara rules for document archives or any files. Install 1. Prerequisites Linux or OS X...
Lazybee tool is a python based script from which you can generate random wordlist for brutefocre attacks. This tool has a...
Specialists from a pentesting course company reported the finding of a vulnerability in Python, the popular programming language. According to the report,...
BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate monitoring...
RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using the...
Discord Remote Administration Tool fully written in Python3. This is a RAT controlled over Discord with over 20 post exploitation modules....
Members of a hacking course discovered that Urllib3, a popular Python HTTP client, could be exposed to the exploitation of a recently...
Researchers uncovered a new cloud-based Python RAT “JhoneRAT” that spreading via weaponized MS word document to steal sensitive data from multiple cloud-based...
Researchers discovered a previously unknown fully-featured Python RAT called”PiXie” escalate the Windows admin privilege to the ransomware in the healthcare and education...
Tech is the future and job seekers need to keep up with the changing requirements of employers in the tech industry. But...
This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you...
It’s that time of year again when GitHub releases its annual Octoverse report and gives us a glimpse of the current state...
UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses....