KasperskyLab / TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In orde…
☆3,078Updated 4 months ago
Related projects: ⓘ
- HiddenVM — Use any desktop OS without leaving a trace.☆2,323Updated 2 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,519Updated 10 months ago
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,542Updated 2 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,029Updated 4 years ago
- An open-source digital image forensic toolset☆2,618Updated 2 weeks ago
- ☆1,224Updated 11 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,895Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,602Updated 6 months ago
- SSH-MITM - ssh audits made simple☆1,304Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆4,856Updated 4 months ago
- IntelOwl: manage your Threat Intelligence at scale☆3,754Updated this week
- Network Analysis Tool☆2,985Updated last year
- An HTTP toolkit for security research.☆6,055Updated 4 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,626Updated this week
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,417Updated 7 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,460Updated 8 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,660Updated 6 months ago
- Connect like there is no firewall. Securely.☆1,458Updated 2 weeks ago
- Modlishka. Reverse Proxy.☆4,792Updated 5 months ago
- A Workflow Engine for Offensive Security☆5,269Updated 3 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆7,380Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆12,702Updated last month
- Fast passive subdomain enumeration tool.☆9,963Updated this week
- A pretty sweet vulnerability scanner☆4,052Updated 6 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆3,485Updated this week
- Adversary Emulation Framework☆8,239Updated this week
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆11,445Updated 6 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆4,087Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆2,869Updated 5 months ago
- Tracking history of USB events on GNU/Linux☆1,153Updated last year