Garud - An automation tool that scans sub-domains, sub-domain takeover
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters. Requirements: Go Language, Python 2.7 or Python 3. System...
View ArticleBash Introduction for Hackers Part 1
Welcome to Bash Intro for Hackers Part 1! This material was prepared by our instructor Saeed Dehqan for our Wireless Network Attacks course as a foundational topic for anyone wanting to automate their...
View ArticleMitaka - a browser extension for OSINT search
Mitaka is a browser extension makes your OSINT search & scan easy. Key features: Auto IoC selection with refang. E.g. example[.]com to example.com, test[at]example.com to test@example.com,...
View ArticleBash Introduction for Hackers part 2
Welcome to Bash Intro for Hackers Part 2! This material was prepared by our instructor Saeed Dehqan for our Wireless Network Attacks course as a foundational topic for anyone wanting to automate their...
View ArticleEyeballer - A convolutional neural network for analyzing pentest screenshots...
Give those screenshots of yours a quick eyeballing. Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts. Go...
View ArticleGraphQLmap - a scripting engine to interact with a graphql endpoint for...
Original repository: https://github.com/swisskyrepo/GraphQLmap#install GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. Install Features and examples Dump a...
View ArticleAndroid App DDoS Attack - Risks And Prevention by Zehra Ali
The DDoS attack has always been a threat to webmasters, which is now being initiated by many apps too. Some malicious mobile apps seem to be normal apps and are downloaded by a large number of users....
View ArticleFuxploider - a file upload vulnerability scanner and exploitation tool
Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded...
View ArticleFinDOM-XSS - a fast DOM based XSS vulnerability scanner with simplicity
FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast manner. Installation $ git clone https://github.com/dwisiswant0/findom-xss.git...
View ArticleIMAPLoginTester - a simple Python script that reads a text file with e-mails...
IMAPLoginTester is a simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login to the respective IMAP servers....
View ArticleVulscan - advanced vulnerability scanning with Nmap NSE
Introduction Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the...
View ArticleSARENKA - an OSINT tool that gets data from services like Shodan, censys,...
Free Software, requires only free accounts to third part services Lack of knowledge ... that is the problem. William Edwards Deming SARENKA is an Open Source Intelligence (OSINT) tool which helps you...
View ArticleGorsair - a tool that hacks its way into remote docker containers that expose...
Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has access to the docker daemon, you can use Gorsair to directly...
View ArticleSqualr - Game Hacking Tool Written in C#
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create and share cheats in their windows desktop games. This includes memory...
View ArticleCodi.vim - the interactive scratchpad for hackers
The interactive scratchpad for hackers. Using Codi as a Python scratchpad through the shell wrapper Codi is an interactive scratchpad for hackers, with a similar interface to Numi. It opens a pane...
View ArticleCloudlist - a tool for listing assets from multiple Cloud Providers by...
Cloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used by the blue team to augment Attack Surface Management efforts by...
View ArticleXDR: Top 5 Solutions Compared by Gilad David Maayan
What is XDR? Security for Endpoints, Networks and Cloud in One System Extended detection and response (XDR) solutions are a new attempt to integrate multiple security tools. They are designed to...
View ArticleList of Free Python Resources [Updated June 2021]
Python is considered as a beginner-friendly programming language and its community provides many free resources for beginners and more advanced users. Our team had gathered the most helpful free...
View ArticleHow 2021 Is Changing the Corporate Cybersecurity Landscape by Anas Chbib
The pandemic has disrupted every aspect of human activity. From grocery shopping to human resources, everything has been forced to change or adapt to this socially distant way of life. Unfortunately,...
View ArticleLinux Passwords [FREE COURSE CONTENT]
In this short video from our Password Cracking course you will learn how to find Linux passwords. It's a basic skill every hacker and pentester should know! While the course goes into much more...
View Article