106. lokiLOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses
107. encoderamaString or worldlist encoder for use in fuzzing or web application testing
108. glasgoGo static analysis tool that checks for security issues using an AST.
112. CECsterA GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols
113. binja senseiA plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other plugins, and provides examples that showcase the features of these plugins
114. grepifyGrepify the GUI Regex Text Scanner for Code Reviewers
115. DatajackProxyDatajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
118. SCOMDecryptSCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers
119. BerserkoBurp Suite extension to perform Kerberos authentication
120. WindowsMemPageDeltaA Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection
124. asafwSet of scripts to deal with Cisco ASA firmware [pack/unpack etc.]
125. JDSer-ngngA Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.
126. WhoWasIImpersonate Logged In Accounts & Execute Commands
127. DIBFWindows NT ioctl bruteforcer and modular fuzzer
129. psrPointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.
132. HTTPSignaturesA Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.
133. ebpfeBPF - extended Berkeley Packet Filter tooling
134. xcavatorA network data locater using credentials obtained during penetration tests
135. binja dynamicsA PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to learn about reverse engineering
140. jmxbfA brute force program to test weak accounts configured to access a JMX Registry
141. firstexecutionCollection of different ways to execute code outside of the expected entry points
142. asadbgasadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices
143. opinelPython code shared by Scout2 and AWS-Recipes
144. GOATCasinoThis is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to exploit a wide variety of issues in a safe environment.