Interactive HTTPS proxy.
Trouvez le bon outil de cybersécurité en quelques secondes.
Cherchez par ce que vous voulez faire, sur quoi, et pourquoi.
cyberstars.action(agir).target(sur n'importe quoi).purpose(tout contexte)344resultsGenerate NTLMv2 hash theft files.
SQL-powered endpoint visibility.
Red-team prompts, agents and RAGs.
pspy
—Spy on Linux processes without root.
GDB plug-in for exploit dev and RE.
CTF framework for exploit dev.
Mimikatz in pure Python.
Radare2 plug-in for Frida.
Portable reversing framework.
rage
—Modern file encryption with age.
SOCKS proxy through a web shell.
Android Dalvik assembler / disassembler.
Semi-automatic OSINT framework.
Automatic SQL injection and database takeover.
SSH server and client config auditor.
Easy SSH honeypot.
Transparent SSH bastion.
Private X.509 + SSH CA + ACME server.
Modular Sysmon configuration repo.
Command-line packet capture.
TCP/IP stream demultiplexer.
Test TLS/SSL on any port.
Terraform static analysis.