The pentester's Swiss knife

XSS Scanning tool

dalfox: Parameter Analysis and XSS Scanning tool

What is DalFox DalFox is a powerful open-source tool that focuses on automation, making it ideal for quickly scanning for XSS flaws and analyzing parameters. Its advanced testing engine and niche features are designed...

implant kit

IllusiveFog: Windows Administrator level Implant

IllusiveFog IllusiveFog is an implant kit for Microsoft Windows-based networks for long-term stealthy access and recon. IllusiveFog is designed for highly covert & stealthy operations, because of this reason features are kept limited and...

side-channel analysis framework

scared: side-channel analysis framework

scared scared is a library that aims to provide tools to achieve side-channel analysis. It provides pretty high-level APIs, and ready-to-use tools to quickly run classic CPA, DPA, … leakage, and reverse analysis. It...

cryptographic services

themis: open-source high-level cryptographic services library

themis Themis is an open-source high-level cryptographic services library for mobile and server platforms, which provides secure data exchange and storage.   Themis provides four important cryptographic services: Secure Message: a simple encrypted messaging...

wordlists

bopscrk: generate smart and powerful wordlists

Bopscrk Bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists. Included in BlackArch Linux pentesting distribution and Rawsec’s Cybersecurity Inventory since August 2019.   The first idea was inspired by Cupp and Crunch. We could say...

pentest reporting application

auditforge: A pentest reporting application

AuditForge AuditForge (PwnDoc fork) is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. The main goal is to have more time to search...

database protection

Acra: database protection suite

What is Acra Acra helps you easily secure your databases in distributed, microservice-rich environments. It allows you to selectively encrypt sensitive records with strong multi-layer cryptography, detect potential intrusions and SQL injections and cryptographically compartmentalize...