WebBreaker – Dynamic Application Security Test Orchestration (DASTO)

WebBreaker - Dynamic Application Security Test Orchestration (DASTO) Build functional security testing, into your software development and release cycles! WebBreaker provides the capabilities to automate and centrally manage Dynamic Application Security Testing (DAST) as part of your DevOps pipeline.WebBreaker truly enables all members of the Software Security Development Life-Cycle (SDLC), with access to security testing,

TorWall – Transparent Tor for Windows

TorWall - Transparent Tor for Windows Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also intercepts and handles DNS requests preventing potential leaks.Tallow has several applications, including:Tor-ifying applications there were never

Wifite 2 – A complete re-write of Wifite (Automated Wireless Attack Tool)

Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool) A complete re-write of wifite, a Python script for auditing wireless networks.What's new?Lots of files instead of one big script.Cleaner process management -- No longer leaves processes running in the background.UX: Target access points are refreshed every second instead of every 5 seconds.UX:

Dradis Framework – Collaboration and reporting for IT Security teams

Dradis Framework - Collaboration and reporting for IT Security teams Dradis is an open-source collaboration framework, tailored to InfoSec teams.GoalsShare the information effectively.Easy to use, easy to be adopted. Otherwise it would present little benefit over other systems.Flexible: with a powerful and simple extensions interface.Small and portable. You should be able to use it while

parameth – Tool to brute discover GET and POST parameters

parameth - Tool to brute discover GET and POST parameters This tool can be used to brute discover GET and POST parameters.Often when you are busting a directory for common files, you can identify scripts (for example test.php) that look like they need to be passed an unknown parameter. This hopefully can help find them.The

XCat – Automate XPath Injection Attacks to Retrieve Documents

XCat - Automate XPath Injection Attacks to Retrieve Documents XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used to retrieve the whole XML document being processed by a vulnerable XPath query, read arbitrary files on the hosts filesystem and utilize out of

habu – Network Hacking Toolkit

habu - Network Hacking Toolkit Habu is to teach (and learn) some concepts about Python and Network Hacking.These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing.Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source code and

TeleShadow – Telegram Desktop Session Stealer (Windows)

TeleShadow - Telegram Desktop Session Stealer (Windows) Stealing desktop telegrams has never been so easy !Set the email and sender details of the sender and recipient and send it to the victim after compiling.How do I use the session file?Delete everything inside folder at C:\Users\YourName\AppData\Roaming\Telegram Desktop\tdata Then Replace Uncompressed files inside tdata folder who