A post exploitation framework designed to operate covertly
Automated tool for mapping & expanding organization’s attack surface
Toolkit aimed to perform lateral movement in restricted environments
A tool to dump the login password from the current linux user
OSINT tool for discovering information linked to email addresses
Chords is binary file strings extractor, with many formats supported.
Multi hash crack suite
Cybersecurity protocol for syncing decentralized graph data
Blockchain-based distributed PKI protocol
Scans GitHub repositories for potentially sensitive files
FIDO strong authentication, encryption, digital signature engine
check if your vpn is falling down
Open Source Intelligence Automation.
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
A Framework for Comparing Password Guessing Strategies
Toolkit to search for malicious shells
Lightweight PHP framework
Fastest way to make secure text.
Templater is a fast log processor for security engineers
Security Workflow Analysis Tool
Tool for synthesizing business process logs.