Kali-Whoami - A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level Kali-Whoami - A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level Reviewed by Zion3R on 5:30 PM Rating: 5
Ventoy - A New Bootable USB Solution Ventoy - A New Bootable USB Solution Reviewed by Zion3R on 5:30 PM Rating: 5
The-Bastion - Authentication, Authorization, Traceability And Auditability For SSH Accesses The-Bastion - Authentication, Authorization, Traceability And Auditability For SSH Accesses Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Security Scorecards - Security Health Metrics For Open Source Security Scorecards - Security Health Metrics For Open Source Reviewed by Zion3R on 5:30 PM Rating: 5
AWS Pen-Testing Laboratory - Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet AWS Pen-Testing Laboratory - Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet Reviewed by Zion3R on 5:30 PM Rating: 5
RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Kconfig-Hardened-Check - A Tool For Checking The Hardening Options In The Linux Kernel Config Kconfig-Hardened-Check - A Tool For Checking The Hardening Options In The Linux Kernel Config Reviewed by Zion3R on 5:30 PM Rating: 5
Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Reviewed by Zion3R on 5:30 PM Rating: 5
Neurax - A Framework For Constructing Self-Spreading Binaries Neurax - A Framework For Constructing Self-Spreading Binaries Reviewed by Zion3R on 5:30 PM Rating: 5
Link - A Command And Control Framework Written In Rust Link - A Command And Control Framework Written In Rust Reviewed by Zion3R on 8:30 AM Rating: 5
Metarget - Framework Providing Automatic Constructions Of Vulnerable Infrastructures Metarget - Framework Providing Automatic Constructions Of Vulnerable Infrastructures Reviewed by Zion3R on 5:30 PM Rating: 5
DNS-Black-Cat(DBC) - Multi Platform Toolkit For An Interactive DNS Shell Commands Exfiltration, By Using DNS-Cat You Will Be Able To Execute System Commands In Shell Mode Over DNS Protocol DNS-Black-Cat(DBC) - Multi Platform Toolkit For An Interactive DNS Shell Commands Exfiltration, By Using DNS-Cat You Will Be Able To Execute System Commands In Shell Mode Over DNS Protocol Reviewed by Zion3R on 5:30 PM Rating: 5
CiLocks - Android LockScreen Bypass CiLocks - Android LockScreen Bypass Reviewed by Zion3R on 5:30 PM Rating: 5
Etherblob-Explorer - Search And Extract Blob Files On The Ethereum Blockchain Network Etherblob-Explorer - Search And Extract Blob Files On The Ethereum Blockchain Network Reviewed by Zion3R on 8:30 AM Rating: 5
IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners Reviewed by Zion3R on 5:30 PM Rating: 5
Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture Reviewed by Zion3R on 8:30 AM Rating: 5
Red-Kube - Red Team K8S Adversary Emulation Based On Kubectl Red-Kube - Red Team K8S Adversary Emulation Based On Kubectl Reviewed by Zion3R on 8:30 AM Rating: 5
DNSObserver - A Handy DNS Service Written In Go To Aid In The Detection Of Several Types Of Blind Vulnerabilities DNSObserver - A Handy DNS Service Written In Go To Aid In The Detection Of Several Types Of Blind Vulnerabilities Reviewed by Zion3R on 5:30 PM Rating: 5
CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments Reviewed by Zion3R on 8:30 AM Rating: 5
Kiterunner - Contextual Content Discovery Tool Kiterunner - Contextual Content Discovery Tool Reviewed by Zion3R on 5:30 PM Rating: 5