Lists (22)
Sort Name ascending (A-Z)
Android Security
API
Automate
Burpsuite Plugins
Checklist
Cloud
CVE
Cyber Crime Tools
EXPLOITS
Flipper
iOS
labs
Onliners
Paths
Payloads
reads
Red Team
RT
Scopes
Source Code Reviews
Thick Client
Wordlists
Stars
A tool to perform Kerberos pre-auth bruteforcing
Azure Red Team tool for graphing Azure and Azure Active Directory objects
PoC Exploit for the NTLM reflection SMB flaw.
A New Approach to Directory Bruteforce with WaybackLister v1.0
BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language ins…
TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.
ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, and command & control attacks through an intuitive graphica…
Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gathering and situational analysis.
Generate Frida bypass scripts for Android APK root and SSL checks.
Adversary simulation and Red teaming platform with AI
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your security workflows effortlessly!
cloc counts blank lines, comment lines, and physical lines of source code in many programming languages.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Voyage is a stateful subdomain enumeration tool that combines passive and active techniques, user-specific databases, and fine-grained control built for efficient and reliable subdomain reconnaissa…
An OSINT tool to search for accounts by username and email in social networks.
Finds Instagram location IDs near a specified latitude and longitude.
Download pictures (or videos) along with their captions and other metadata from Instagram.
Hunt down social media accounts by username across social networks
Manage WhatsApp .crypt12, .crypt14 and .crypt15 files.
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
The essential toolkit for reversing, malware analysis, and cracking