Sunday, May 27, 2018
Home Tags Log management

Tag: log management

Must Need

Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
whatweb

whatweb

Simple but effective Web Discovery & Web Vulnerability Analysis with whatweb Whatweb is the perfect name for this tool. Simply it answers the question, “What...
FBHT

FBHT – Facebook Hacking Tool

FBHT stand for Facebook Hacking Tool. Python - -version 2.7.3 (Windows/Linux) IMPORTS FBHT Selenium Matplotlib-1.2.1 Networkx-1.8.1 Numpy-1.7.1 Pygraphviz-1.1 Simplejson-3.3.0 Mechanize-0.2.5 Other: gephi-0.8.2-beta (Graphs software) Also Read Ddos2track –...
Windows Hacking Pack

Microsoft Windows Hacking Pack – WHP

Tools here for Windows Hacking Pack are from different sources. The repo is generally licensed with WTFPL, but some content may be not (eg....
cymothoa

Cymothoa

Maintaining Access to a linux machine using cymothoa - Post Exploitation   Cymothoa is a post-exploitation tool. It can be used to maintain access to an...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
WMD

WMD – Weapon of Mass Destruction

WMD is a python tool with an accumulation of IT security software. The product is incapsulated in "modules". The modules consists of unadulterated python...