Fast full-featured SSL scanner

SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. It is…

Debug user-mode processes using a kernel debugger

When a user-mode process deploys various userland anti-debugging tricks, you can use kernel debugging to attach to the process and…

VS 2015 Unresolved external symbol __except_handler4_common

__except_handler4_common is defined in vcruntime library. This happens in Visual Studio 2015 when you select Multi-threaded (/MT) Runtime Library and…

LLMNR NBT-NS and MDNS poisoner

Responder an LLMNR, NBT-NS and MDNS poisoner. It will answer to specific NBT-NS (NetBIOS Name Service) queries based on their…

Find vulnerable routers and devices on the Internet

The Routerhunter is an automated security tool que finds vulnerabilities and performs tests on routers and vulnerable devices on the…

Public documents harvester

Metagoofil is a tool for conducting public documents (pdf,doc,xls,ppt,etc) reconnaissance during a pen test. This information could be useful because…

Automated basic digital reconnaissance

InstaRecon is an automated basic digital reconnaissance tool, great for getting an initial footprint of your targets and discovering additional…

Scan for vulnerable 3rd party web applications

Yasuo is a ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network. During a network…

Cannot Copy/Paste on Kali and Vmware Workstation 12

If you cannot copy/paste from Kali 2016 to host or from host to Kali 2016 inside Vmware Workstation 12, follow…

Convert Virtual Machines Between VirtualBox and VMware

VMware to VirtualBox >> Before migrating a vm, ensure it’s powered off. >> Open a command line. cd C:\Program Files…

Next Page