Featured Post

meg+ - Automated Reconnaissance Wrapper meg+ - Automated Reconnaissance Wrapper Reviewed by Lydecker Black on 6:12 PM Rating: 5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) Reviewed by Lydecker Black on 10:06 AM Rating: 5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Reviewed by Lydecker Black on 5:29 PM Rating: 5
Invoke-Obfuscation - PowerShell Obfuscator Invoke-Obfuscation - PowerShell Obfuscator Reviewed by Lydecker Black on 10:00 AM Rating: 5
Mitm6 - Pwning IPv4 Via IPv6 Mitm6 - Pwning IPv4 Via IPv6 Reviewed by Lydecker Black on 5:04 PM Rating: 5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies Reviewed by Lydecker Black on 10:12 AM Rating: 5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website Reviewed by Lydecker Black on 5:33 PM Rating: 5
Findsploit - Find Exploits In Local And Online Databases Instantly Findsploit - Find Exploits In Local And Online Databases Instantly Reviewed by Lydecker Black on 10:30 AM Rating: 5
MADLIRA - Malware detection using learning and information retrieval for Android MADLIRA - Malware detection using learning and information retrieval for Android Reviewed by Lydecker Black on 5:53 PM Rating: 5