Monday, May 21, 2018

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

peepdf

PEEPDF : A one stop tool for PDF Document forensic analysis Peepdf is a tool for forensic analysis of pdf documents....
chntpw

chntpw

Windows Password, Account Forensics & Change user password with Chntpw chntpw is a Kali Linux tool that can be used to...

Must Need

eggshell

EggShell – Remote Administration Tool For iOS/macOS

EggShell is a post misuse surveillance instrument written in Python. It gives you a command line session with additional usefulness amongst you and an...
masscan

Masscan – Scan the whole internet

How to use masscan to enumerate large number of hosts quickly Masscan has been around for some time now and already it's in use by pentesters all around....
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
DVIA

DVIA – Damn Vulnerable iOS Application

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...
bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
whatweb

whatweb

Simple but effective Web Discovery & Web Vulnerability Analysis with whatweb Whatweb is the perfect name for this tool. Simply it answers the question, “What...