udp-hunter: Network assessment tool for various UDP Services
What is UDP Hunter? UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the tool choices get pretty limited. UDP...
What is UDP Hunter? UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the tool choices get pretty limited. UDP...
checkov Checkov is a static code analysis tool for infrastructure-as-code. It scans cloud infrastructure provisioned using Terraform, Cloudformation, or kubernetes and detects security and compliance misconfigurations. Checkov is written in...
boko Application Hijack Scanner for macOS boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities for application executables, as well...
NTLM scanner Checks for various NTLM vulnerabilities over SMB. The script will establish a connection to the target host(s) and send an invalid NTLM authentication. If this is accepted, the...
Information Gathering / Vulnerability Analysis
by do son · Published March 4, 2020 · Last modified October 25, 2022
Pulsar Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. It’s focused on the discovery of organization public-facing assets with minimal knowledge about its infrastructure....
Defense / Vulnerability Analysis
by do son · Published February 24, 2020 · Last modified April 20, 2022
Spray-AD, a Cobalt Strike tool to perform a fast Kerberos password spraying attack against Active Directory. This tool can help Red and Blue teams to audit Active Directory user accounts...
Information Gathering / Vulnerability Analysis
by do son · Published February 4, 2020 · Last modified October 11, 2023
naabu naabu is a fast port scanner tool written in Go that allows you to enumerate valid ports for hosts in a fast and reliable manner. It is a really...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published January 23, 2020 · Last modified February 6, 2022
nray Nray is a free, platform and architecture-independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on sources like certificate...
Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published January 7, 2020 · Last modified December 4, 2020
npq safely* install packages with npm/yarn by auditing them as part of your install process. npq will perform the following steps to sanity check that the package is safe by employing...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published December 25, 2019 · Last modified January 17, 2023
Goby – Attack surface mapping The new generation of network security technology achieves rapid security emergencies through the establishment of a complete asset database for the target. Scan Asset Scanning...
Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published December 22, 2019 · Last modified November 27, 2022
git-vuln-finder Finding potential software vulnerabilities from git commit messages. The output format is a JSON with the associated commit which could contain a fix regarding a software vulnerability. The search...
Information Gathering / Vulnerability Analysis
by do son · Published December 17, 2019 · Last modified January 4, 2021
Silver Mass Vulnerability Scanner masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by...
Programming / Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published December 12, 2019
huskyCI – Performing security tests inside your CI huskyCI is an open-source tool that performs security tests inside CI pipelines of multiple projects and centralizes all results into a database...
Flan Scan is a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services and their version, and get a list of...
Programming / Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published November 18, 2019
AURA – Security Auditing and code introspection The current trend in the development is to use a lot of packages in the development phase, even if they provide only trivial...