Symbolic-execution for EVM bytecode.
Tools for research
Vulnerability and malware research.
166 tools indexed
WiFi firmware patches: monitor mode + injection.
Modular C2 framework.
Continuous fuzzing for open source.
Modern intentionally vulnerable web app.
Completely ridiculous API (training target).
Runtime mobile exploration via Frida.
Anonymous file share + chat over Tor.
Benchmark prompt-injection attacks on LLMs.
Open cyber threat intelligence platform.
Direct Memory Access attack toolkit.
PEDA
—Python Exploit Development Assistance for GDB.
Pacu
—Open-source AWS exploitation framework.
C++ library for packet capture and crafting.
OSINT framework for phone numbers.
Offline WPS pin brute-force.
Super-timelining for forensics.
PowerShell post-exploitation framework.
Linux port of Sysinternals Procmon.
JavaScript deobfuscator.
WPS pin brute-force attack.
Endgame's ATT&CK simulation framework.
C2 redirector with traffic control.
RSA recovery for CTF challenges.