
The Noddos client monitors network traffic in the home- or enterprise network, identifies with IOT devices are present and dynamically applies device-specific ACLs to the…

MaxRecon is a tool automates some steps of Information Gathering from a target The module Google Hacking uses the tool: Google Hack Database Tool automatically….

DISCLAIMER: You shall not misuse this tool to gain unauthorized access. This tool should only be used to expand knowledge, and not for causing malicious…

WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. How does it work? To do its magic, WAFW00F does the following: – Sends a normal…

shellcoder is a perl application which creates c source shellcodes starting from assembly sources or executables, it can create both windows and gnu/linux shellcodes and…

Disclaimer: Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. Seth is a tool written in…

Mercure is a tool for security managers who want to teach their colleagues about phishing. What Mercure can do: * Create email templates * Create…

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious…