Darknet

  • HiddenWall – Create Hidden Kernel Modules
    HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers. It supports custom rules with netfilter (block ports, hidden mode, rootkit fun …
  • Anteater – CI/CD Security Gate Check Framework
    Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of nominated strings, filenames, binaries, deprecated functions, staging environment code/credentials etc. It’s main f …
  • Stardox – Github Stargazers Information Gathering Tool
    Stardox is a Python-based GitHub stargazers information gathering tool, it scrapes Github for information and displays them in a list tree view. It can be used for collecting information about your or …
  • ZigDiggity – ZigBee Hacking Toolkit
    ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet of Things) penetration testing framework targeting the ZigBee smart home protocol. ZigBee continues to grow in popularity as a metho …
  • RandIP – Network Mapper To Find Servers
    RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH. RandIP – N …
  • Nipe – Make Tor Default Gateway For Network
    Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network through which you can surf the internet …
  • Mosca – Manual Static Analysis Tool To Find Bugs
    Mosca is a manual static analysis tool written in C designed to find bugs in the code before it is compiled, much like a grep unix command. There are various ‘egg’ modules which contain patterns to sc …
  • Slurp – Amazon AWS S3 Bucket Enumerator
    Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan from an external perspective or an AWS API to scan internally. There are two modes that this to …
  • US Government Cyber Security Still Inadequate
    Surprise, surprise, surprise – an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling. US G …
  • BloodHound – Hacking Active Directory Trust Relationships
    BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can us …

%d bloggers like this: