Backdoors win32 PE files, to continue normal file execution (if the shellcode supports it), by patching the exe/dll directly. Some executab...
[Malcom] Malware Communication Analyzer
Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic. This comes ha...
[Vulscan] Module which enhances nmap to a vulnerability scanner
Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used...
[LinEnum] Scripted Local Linux Enumeration & Privilege Escalation Checks
High-level summary of the checks/tasks performed by LinEnum: Kernel and distribution release details System Information: Hostname Networkin...
[I2P] Anonymizing Network
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wr...
[Tunna Framework] Tool designed to bypass firewall restrictions on remote webservers
Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully...
[Introspy] Monitor app in your iDevice
The Problem In 2013, assessing the security of iOS applications still involves a lot of manual, time-consuming tasks - especially when per...
[Raft v3.0.1] Response Analysis and Further Testing Tool
Not an inspection proxy RAFT is a testing tool for the identification of vulnerabilities in web applications. RAFT is a suite of tools t...
[The Burp SessionAuth] Extension for Detection of Possible Privilege escalation vulnerabilities
Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session storage. Howe...