Smart OSINT Collection of Common IOC (Indicator of compromise) Types This application is designed to assist security analysts and res... Read more »
Smart OSINT Collection of Common IOC Types

Smart OSINT Collection of Common IOC (Indicator of compromise) Types This application is designed to assist security analysts and res... Read more »
XRay is a software for recon, mapping and OSINT gathering from public networks. XRay for network OSINT gathering, its goal is to make ... Read more »
Automated Vulnerability Scanner for XSS Written in Python3 Traxss is an automated framework to scan URLs and webpages for XSS Vu... Read more »
Penta (PENTest + Automation tool) is Pentest automation tool using Python3. Installation Install requirements penta requires the f... Read more »
Dolos Cloak- Automated 802.1x Bypass Dolos Cloak is a python script designed to help network penetration testers and red teamers byp... Read more »
PostShell - Post Exploitation Bind/Backconnect Shell PostShell is a post-exploitation shell that includes both a bind and a back con... Read more »
FinDomain- Fastest And Cross-platform Subdomain Enumerator. Comparison It comparison gives you a idea why you should use findomain in... Read more »
Burp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of tested endpoints. Main Features Simple, easy ... Read more »
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams. With limited physical access to a target building, this tap... Read more »
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made to be used in the same folder as CloudFail . Ma... Read more »
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation o... Read more »
Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux. usbrip (derived from "... Read more »