Secbutler - The Perfect Butler For Pentesters, Bug-Bounty Hunters And...
Essential utilities for pentester, bug-bounty hunters and security researcherssecbutler is a utility tool made for pentesters, bug-bounty hunters and security researchers that contains all the most...
View ArticleWEB-Wordlist-Generator - Creates Related Wordlists After Scanning Your Web...
WEB-Wordlist-Generator scans your web applications and creates related wordlists to take preliminary countermeasures against cyber attacks.Done[x] Scan Static Files.[ ] Scan Metadata Of Public...
View ArticleNullSection - An Anti-Reversing Tool That Applies A Technique That Overwrites...
NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.Installgit clone https://github.com/MatheuZSecurity/NullSectioncd NullSectiongcc...
View ArticleMrHandler - Linux Incident Response Reporting
MR.Handler is a specialized tool designed for responding to security incidents on Linux systems. It connects to target systems via SSH to execute a range of diagnostic commands, gathering crucial...
View ArticleAzSubEnum - Azure Service Subdomain Enumeration
AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. This tool is designed to meticulously search and identify subdomains associated with various Azure services. Through a...
View ArticleSwaggerSpy - Automated OSINT On SwaggerHub
SwaggerSpy is a tool designed for automated Open Source Intelligence (OSINT) on SwaggerHub. This project aims to streamline the process of gathering intelligence from APIs documented on SwaggerHub,...
View ArticleSpeedyTest - Command-Line Tool For Measuring Internet Speed
SpeedyTest is a powerful command-line tool for measuring internet speed. With its advanced features and intuitive interface, it provides accurate and comprehensive speed test results. Whether you're a...
View ArticleSploitScan - A Sophisticated Cybersecurity Utility Designed To Provide...
SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability. Empowering...
View ArticleRepoReaper - An Automated Tool Crafted To Meticulously Scan And Identify...
RepoReaper is a precision tool designed to automate the identification of exposed .gitrepositories across a list of domains and subdomains. By processing a user-provided text file with domain names,...
View ArticleswaggerHole - A Python3 Script Searching For Secret On Swaggerhub
Introduction This tool is made to automate the process of retrieving secrets in the public APIs on [swaggerHub](https://app.swaggerhub.com/search). This tool is multithreaded and pipe mode is available...
View ArticleCVE-2024-23897 - Jenkins
Exploitation and scanning tool specifically designed for Jenkins versions <= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances....
View ArticleBackDoorSim - An Educational Into Remote Administration Tools
BackdoorSim is a remote administration and monitoring tool designed for educational and testing purposes. It consists of two main components: ControlServer and BackdoorClient. The server controls the...
View ArticleHuntr-Com-Bug-Bounties-Collector - Keep Watching New Bug Bounty...
New bug bounty(vulnerabilities) collectorRequirementsChrome with GUI (If you encounter trouble with script execution, check the status of VMs GPU features, if available.)Chrome WebDriverPreview#...
View ArticleCanaryTokenScanner - Script Designed To Proactively Identify Canary Tokens...
Detecting Canary Tokens and Suspicious URLs in Microsoft Office, Acrobat Reader PDF and Zip FilesIntroductionIn the dynamic realm of cybersecurity, vigilance and proactive defense are key. Malicious...
View ArticleLeakSearch - Search & Parse Password Leaks
LeakSearch is a simple tool to search and parse plain text passwords using ProxyNova COMB (Combination Of Many Breaches) over the Internet. You can define a custom proxy and you can also use your own...
View ArticleRKS - A Script To Automate Keystrokes Through A Graphical Desktop Program
A script to automate keystrokes through an active remote desktop session that assists offensive operators in combination with living off the land techniques.About RKS (RemoteKeyStrokes)All credits goes...
View ArticleMoukthar - Android Remote Administration Tool
Remote adminitration tool for androidFeaturesNotifications listenerSMS listenerPhone call recordingImage capturing and screenshotsPersistence Read & write contactsList installed...
View ArticleKali Linux 2024.1 - Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2024.1. This release has various impressive updates.The summary of the changelog since the 2023.4 release from December is:Micro Mirror Free Software...
View ArticleTinyfilemanager-Wh1Z-Edition - Effortlessly Browse And Manage Your Files With...
Introducing Tiny File Manager [WH1Z-Edition], the compact and efficient solution for managing your files and folders with enhanced privacy and security features. Gone are the days of relying on...
View ArticleBloodHound - Six Degrees Of Domain Admin
BloodHound is a monolithic web application composed of an embedded React frontend with Sigma.js and a Go based REST API backend. It is deployed with a Postgresql application database and a Neo4j graph...
View Article