Xnuspy – An iOS Kernel Function Hooking Framework For Checkra1N’Able Devices
Output from the kernel log after compiling and running example/open1_hook.c xnuspy is a pongoOS module which installs a new system...
Output from the kernel log after compiling and running example/open1_hook.c xnuspy is a pongoOS module which installs a new system...
ZMap is a fast single packet network scanner designed for Internet-wide network surveys. On a typical desktop computer with a...
sigurlx a web application attack surface mapping tool, it does ...: Categorize URLs URLs' categories: > endpoint > js {js}...
Search For Documents In A Domain Through Google. The Objective Is To Extract Metadata.Installing dependencies:> git clone https://github.com/Josue87/MetaFinder.git> cd MetaFinder>...
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control...
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency....
It goes without saying that the 117th US Congress has a lot to get done and many legitimate priorities are...
This is a simple script intended to perform a full recon on an objective with multiple subdomains tl;drRequires Go Run...
A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting WeaponsOSTypeNameDescriptionAllAnalysisRMS-Runtime-Mobile-SecurityRuntime Mobile Security (RMS) - is a...
Purchasing software through AWS Marketplace has to be one of the most under-appreciated perks of being an Amazon Web Services...
A tool to hunt for credentials in the GitHub wild AKA git*huntGetting startedInstall the tool Configure your GitHub token Search...
HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless...
LEQL Multi-groupby in InsightIDRFor a look at the most up-to-date list of Log Search capabilities, check out our help documentation...
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial...
Collect OSINT for GitLab groups and members and search the group and group members' snippets, issues, and issue discussions for...
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. FeaturesFeatureful...
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc... Check Documentation for...
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are...
ByteDance-HIDS is a Cloud-Native Host-Based Intrusion Detection solution project to provide next-generation Threat Detection and Behavior Audition with modern architecture....
ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 Replace...
stegbrute is a fast steganography brute force tool written in Rust using also threads to achieve a faster executionDependenciesStegbrute cannot...
PINEAPPLE MK7 REST CLIENTThe leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks...
(pronounced: "kay fifty-five") The K55 payload injection tool is used for injecting x86_64 shellcode payloads into running processes. The utility...
Umbrella is an Android mobile app developed by Security First that provides human rights defenders with the information on what...