Doldrums – A Flutter/Dart Reverse Engineering Tool
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...
This is an integration of the Ghidra decompiler and Sleigh Disassembler for rizin. It is solely based on the decompiler...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...
A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future...
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial...
LightMe is a Simple HTTP Server serving Powershell Scripts/Payloads after Obfuscate them and run obfuscation as a service in backgroud...
rtl_433 (despite the name) is a generic data receiver, mainly for the 433.92 MHz, 868 MHz (SRD), 315 MHz, 345...
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful...
r2 is a rewrite from scratch of radare. It provies a set of libraries, tools and plugins to ease...
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user...
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works...
Azure JSON Web Token ("JWT") Manipulation Toolset Azure access tokens allow you to authenticate to certain endpoints as a user...
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security...
Created by David French (@threatpunter) at Elastic Security Dorothy is a tool to help security teams test their monitoring and...
Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files.Installing /...
rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT...
A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the...
This project's goal is to be simple to create and destroy your own VPN service using WireGuard.PrerequisitesTerraform >= 1.0.0 Ansible...
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. PurposeBrute-forcing website...
In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...