Reverset is a reverse engineering and binary analysis tool.
Reverset is a lightweight portable reverse engineering and binary analysis tool. Currently supports the entire standard x86 instruction set, with coming support for x87 fpu, avx, and sse instructions....
View ArticleNatlog is a utility logging traffic through a firewall doing source natting.
Natlog is a utility logging traffic through a firewall that performs source-NATting (a.k.a. POSTROUTING). Firewalls like iptables usually offer POSTROUTING source network address translation facilities...
View Articler2kit – A set of scripts for a radare-based malware code analysis workflow.
r2kit is a set of scripts to help with a workflow for malware code analysis using radare. + sessionstarter.py – Run from inside an r2 session to auto rename imports, thunks, wrapper functions, and...
View Articleunfurl is An Entropy Based Link Vulnerability Analysis Tool.
unfurl is a tool that analyzes large collections of URLs and estimates their entropies to sift out URLs that might be vulnerable to attack. The big idea is to find tokens in a large list of URLs that...
View ArticleTransit : a Mac-OS incident Response Toolkit.
Transit is a MacOS Incident Response toolkit. Transit can pull the following information from a system. 1. Well return a series of information about the system itself. 2. This option will return the...
View ArticleWafid – Web Applications Firewall and fingerprint identify Tool.
Wafid allows one to identify and fingerprint Web Applications Firewall (WAF) products protecting a website. How does it work? Wafid sends a normal HTTP request and analyses the response; this...
View ArticleStaCoAn – an open source static code analyser for bugbounty hunters and...
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool will look for interesting lines in the...
View Articleharpoon – CLI tool for open source and threat intelligence(OSINT).
harpoon is a python3 scripting for get, Requests and gather information from; censys, shodan, AlienVault OTX, Virus Total, MalShare database, Total Hash, Telegram, Twitter, github and many more.....
View ArticleVindicate An LLMNR/NBNS/mDNS Spoofing Detection Toolkit.
What is Vindicate? Vindicate is a tool which detects name service spoofing, often used by IT network attackers to steal credentials (e.g. Windows Active Directory passwords) from users. It’s designed...
View ArticlesRDI – Shellcode Reflective DLL Injector.
sRDI is a Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode. sRDI allows for the conversion of DLL files to position independent shellcode....
View ArticleTHRecon – Threat Hunting Reconnaissance Toolkit.
THRecon is a Powershell module for Threat-Hunting and Reconnaissance toolkit. Function Feature: + Get-THR_ADS: Performs a search for alternate data streams (ADS) on a system. Default starting directory...
View Articleandroguard v3.1.0-rc1 – Reverse engineering, Malware and goodware analysis of...
What has changed androguard v3.1.0-rc1? – Ported Androguard to python3! You can now use py2.7 or py>=3.3! – Tainted Analysis is gone and will be replaced by XREFs using the...
View ArticleAnti-Logger : In efforts to stop malware to a point.
Anti-Logger In efforts to stop malware to a point. Supported Applications: + Cookie Ghost + Cookie Venom + Sir Cookie + browserLoot + njRAT + QuasarRAT + Cookie Muncher + Predator Logger + Vulcan...
View Articlesilk v3.16.1 – monitoring and security analysis for Large-Scale Networks.
SiLK Release 3.16.1, 2018-Feb-15 Changelog: * rwstats ++ Fix a bug that occurred when using a large amount of memory and could result in corrupted output. * rwuniq ++ Fix a bug that occurred when using...
View Articletrackerjacker – Finds and tracks wifi devices through raw 802.11 monitoring.
trackerjacker is python3 script for Finds and tracks wifi devices through raw 802.11 monitoring. dependencies: – Python 3.x – scapy-python3==0.21 and PyYAML==3.12 python3 library. Example use-cases +...
View Articlegitleaks – detecting and mitigating for secrets keys.
gitleaks a golang scripting for Searches full repo history for secrets and keys. Features + Search all commits on all branches in topological order + Regex/Entropy checks Introduction! Many web and...
View ArticlePhishThis – Test phishing email detector.
Ever get excessively bothered by the test phishing emails that InfoSec sends to educate you and your co-workers? PhishThis is here to help. PhishThis will watch your gmail inbox and detect when a test...
View Articledroidcarve – Commandline Android reverse engineering tool.
DroidCarve is capable of analyzing an Android APK file and automate certain reverse engineering tasks. Features: + Code disassembling into Smali bytecode. + APK signature extraction. + AndroidManifest...
View ArticleRootkit Hunter v1.4.6 – security monitoring and analyzing tool for POSIX...
* changelog RootkitHunter v1.4.6 (20/02/2018) New: – Added support for Alpine Linux (busybox). – Added the ‘Diamorphine LKM’ test. – Added the ALLOWIPCPID configuration file option. This will allow...
View Articledroidstatx – Android Applications Security Analyser, Xmind Generator.
+ droidstatx is a Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. + The map itself is an Android...
View Article