PyAna - Analyzing the Windows shellcode.. Using Unicorn Framework for emulating shellcode. PyAna emulate a process on Windows: PEB, ... Read more »
- Latest Post
More Headlines
HexPADS, A Host-based, Performance-counter-based Attack Detection System
HexPADS, A Host-based, Performance-counter-based Attack Detection System Current systems are under constant attack from many different... Read more »
Malcom - Malware Communication Analyzer of Network Traffic
Malcom - Malware Communication Analyzer of Network Traffic . Malcom is a tool designed to analyze a system's network communic... Read more »
MEMSCAN A Memory Scanning Tool For A Specific Sequence of Bytes
MEMSCAN A Memory Scanning Tool.. For A Specific Sequence of Bytes! A memory scanning tool which uses mach_vm* to either dump memo... Read more »
GitHub Announces To Support Universal 2nd Factor Authentication
GitHub Announces To Support Universal 2nd Factor Authentication (U2F) A rapidly growing open authentication standard! When you ins... Read more »
Thug: A Tool For Python Low-Interaction Honeyclient
Thug: A Tool For Python Low-Interaction Honeyclient Thug is a Python low-interaction honeyclient aimed at mimicing the behavior of a w... Read more »
How To Test Security in IPv4 and IPv6 Data Networks?
How To Test Security in IPv4 and IPv6 Data Networks ? Evil Foca is a tool for security pentesters and auditors whose purpose it is t... Read more »
AIDE (Advanced Intrusion Detection Environment) To Verify The Integrity Of Files
AIDE (Advanced Intrusion Detection Environment) To Verify The Integrity Of Files AIDE is a file and directory integrity checker. Wha... Read more »
MALHEUR - Automatic Analysis of Malware Behavior
MALHEUR - Automatic Analysis of Malware Behavior Malheur is a tool for the automatic analysis of malware behavior (program behavior re... Read more »
Toxy: Hackable HTTP Proxy To Simulate Server Failure Scenarios And Unexpected Network Conditions
Toxy: Hackable HTTP Proxy To Simulate Server Failure Scenarios And Unexpected Network Conditions toxy is a fully programmatic and hack... Read more »
SONAR: A Framework For Identifying And Launching Exploits Against Internal Network Hosts
SONAR: A Framework For Identifying And Launching Exploits Against Internal Network Hosts Works via WebRTC IP scanning combined with ex... Read more »
BinNavi A Binary Analysis IDE To Control Disassembled Code
BinNavi: A Binary Analysis IDE To Control Disassembled Code BinNavi is a binary analysis IDE that allows to inspect, navigate, edit an... Read more »
PortDog: Port Scanning Tool In Python
PortDog: Port Scanning Tool In Python PortDog is a network anomaly detector aimed to detect port scanning techniques. It is entire... Read more »
Inveigh: A Windows PowerShell LLMNR/NBNS Spoofer With Challenge/Response Capture Over HTTP/SMB
Inveigh: A Windows PowerShell LLMNR/NBNS Spoofer With Challenge/Response Capture Over HTTP/SMB. Inveigh is a Windows PowerShell L... Read more »
Nuclide: An Open IDE Experience for Hack development
Nuclide : An open IDE for web and native mobile development, built on top of Atom to Provide Hackability. Nuclide is the first IDE wit... Read more »
Fuddly: Fuzzing And Data Manipulation Framework
Fuddly: Fuzzing And Data Manipulation Framework List of features Graph-based data model that enables: To represent complex data f... Read more »
TurboBytes Pulse Tool To Run Network Diagnostics In Distributed Manner
TurboBytes Pulse Tool To Run Network Diagnostics In Distributed Manner. It is made up of 2 components! CNC : This is the Command &a... Read more »
YASUO: A Ruby Script That Scans Vulnerable 3rd-Party Web Applications
YASUO: A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network. While working on a ne... Read more »