Recon Tool: WaybackLister
WaybackLister is a reconnaissance tool designed for web application penetration testers, red teamers, and bug bounty hunters. It automates the discovery of potentially exposed directory listings on web servers by leveraging historical data from the Wayback Machine (archive.org).
OSINT Tool: GoogleDorker
GoogleDorker is a tool designed for ethical hackers, bug bounty hunters, and penetration testers. It automates and enhances the process of Google Dorking—a technique that uses advanced Google search operators to find sensitive information exposed on the internet.
Offensive Security Tool: QuickResponseC2
QuickResponseC2 is a highly covert Command and Control (C2) framework and it operates by leveraging QR codes and HTTP(S) for indirect communication between an attacker and a compromised system.
Recon Tool: AdminPBuster (Admin Panel Buster)
AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectively bypassing WAFs.
Browser Extension-Based Security Tool: FrogPost
FrogPost is a Chrome extension for testing and analyzing the security of postMessage communications between iframes. It helps developers and security professionals identify vulnerabilities in message-handling implementations.
Recon Tool: RADAR
RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services used by domains through their DNS footprints.
Recon Tool: spoof_checker
spoof_checker is a tool designed to identify misconfigurations in email authentication mechanisms and check for subdomain takeover vulnerabilities.
Offensive Security Tool: CTFPacker
CTFPacker is a customizable Windows payload packer and loader designed to help red teamers, penetration testers, and CTF participants evade detection from antivirus (AV) and EDR (Endpoint Detection and Response) systems during offensive operations.
Offensive Security Tool: DS Viper
DS Viper is a post-exploitation tool specifically designed to bypass Windows Defender and various Endpoint Detection and Response (EDR) systems.









