sylkie: IPv6 Address Spoofing
A command line tool and library for testing networks for common address spoofing security vulnerabilities in IPv6 networks using the Neighbor Discovery Protocol.
Dependencies
libseccomp
json-c
Basic usage
The...
Assimilator: Automatic Firewall Rule Orchestator
The first all in one API to control and manage all firewall brands. Assimilator enables you to configure any firewall with restful API calls,...
MobSF: Mobile Security Framework
Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. We’ve been...
Encrypting files using Cryptomator
With the global fixation that governments seem to have at the moment regarding the creation of backdoors in chat based apps, you can forgive...
SySS Radio Hack Box to Hack Wireless
The Radio Hack Box is a tool to Demonstrate Vulnerabilities in Wireless Input Devices. The SySS Radio Hack Box is a proof-of-concept software tool...
netattack- A Tool for Wireless Network Scan and Attack
The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and...
EaST- Framework of Exploit and Security Tools
Pentest framework environment is the base of IT security specialist’s toolkit. This tool is vital as for learning and improving IT systems attacks knowledge...
WordPress Attack Suite WPForce
WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle,...
Moloch: Open Source Large Scale Full Packet Capturing Tool
Moloch is an open source, large scale, full packet capturing, indexing, and database system. Moloch augments your current security infrastructure to store and index...
Vallumd: Tool to Centralize or Distribute IPset Blacklists
If you maintain a server on the Internet, it’s very expected that you encounter one or more brute force attacks. Not a problem, just...
DNSControl: A Tool for Synchronizing DNS to Multiple Providers
DNSControl is a tool for maintaining DNS zones. It has two components: a domain specific language (DSL) for describing DNS zones plus software that...
Stegosaurus: A Steganography Tool
Stegosaurus is a steganography tool that is used for embedding payloads within Python byte code. The process does not modify the runtime performance or...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...