EvilnoVNC – Ready To Go Phishing Platform

3 years ago

EvilnoVNC is a Ready to go Phishing Platform. Unlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real…

AoratosWin : A Tool That Removes Traces Of Executed Applications On Windows OS

3 years ago

AoratosWin is a tool that removes traces of executed applications on Windows OS which can easily be listed with tools…

Cloudfox – Automating Situational Awareness For Cloud Penetration Tests

3 years ago

CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help…

Arsenal – Recon Tool Installer

3 years ago

Arsenal is a Simple shell script (Bash) used to install the most important tools and requirements for your environment and…

Erlik 2 : Vulnerable Flask App

3 years ago

Erlik 2 is a vulnerable Flask Web App. It is a lab environment created for people who want to improve…

Utkuici – Nessus Automation

3 years ago

Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great…

Java-Remote-Class-Loader : Tool To Send Java Bytecode Victims To Load & Execute

3 years ago

Java-Remote-Class-Loader is a tool that allows you to send Java bytecode in the form of class files to your clients…

Bayanay – Python Wardriving Tool

3 years ago

Bayanay is a Python Wardriving tool. WarDriving is the act of navigating, on foot or by car, to discover wireless…

Deadfinder – Find Dead-Links (Broken Links)

3 years ago

Dead link (broken link) means a link within a web page that cannot be connected. These links can have a…

Pmanager – Store And Retrieve Your Passwords From A Secure Offline Database

3 years ago

PManager Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent…