ReverseAPK – Quickly Analyze And Reverse Engineer Android Packages

ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages Quickly analyze and reverse engineer Android applications.FEATURES:Displays all extracted files for easy referenceAutomatically decompile APK files to Java and Smali formatAnalyze AndroidManifest.xml for common vulnerabilities and behaviorStatic source code analysis for common vulnerabilities and behaviorDevice infoIntentsCommand executionSQLite referencesLogging referencesContent providersBroadcast recieversService referencesFile referencesCrypto referencesHardcoded secretsURL'sNetwork connectionsSSL

Prowler – Distributed Network Vulnerability Scanner

Prowler - Distributed Network Vulnerability Scanner Prowler is a Network Vulnerability Scanner implemented on a Raspberry Pi Cluster, first developed during Singapore Infosec Community Hackathon - HackSmith v1.0.CapabilitiesScan a network (a particular subnet or a list of IP addresses) for all IP addresses associated with active network devicesDetermine the type of devices using fingerprintingDetermine if

Attackintel – Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups

Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups A simple python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.GoalsQuickly align updated tactics, techniques, mitigation, and detection information from MITRE ATT&CK API for a

GyoiThon – A Growing Penetration Test Tool Using Machine Learning

GyoiThon - A Growing Penetration Test Tool Using Machine Learning GyoiThon is a growing penetration test tool using Machine Learning.GyoiThon identifies the software installed on web server (OS, Middleware, Framework, CMS, etc...) based on the learning data. After that, it executes valid exploits for the identified software using Metasploit. Finally, it generates reports of scan

Terminator – Metasploit Payload Generator

Terminator - Metasploit Payload Generator Terminator Metasploit Payload Generator.Payload List :Binaries Payloads1) Android2) Windows3) Linux4) Mac OSScripting Payloads1) Python2) Perl3) BashWeb Payloads1) ASP2) JSP3) WarEncrypters1) APK Encrypter2) Python EncrypterThe author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished

iOSRestrictionBruteForce v2.1.0 – Crack iOS Restriction Passcodes With Python

iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered.DEPENDENCIESThis has been tested with Python 2.7 and Python 3.6Requires Passlib