DroidFiles : Get Files From Android Directories

5 years ago

DroidFiles is a tool used to get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, …)…

Memory Mapper : Map Both Native & Managed Assemblies Into Memory

5 years ago

Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by…

RepoPeek : A Python Script To Get Details About A Repository Without Cloning

5 years ago

RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using…

Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents

5 years ago

Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with…

QRLJacking : Hijack Services That Relies On QR Code Authentication

5 years ago

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all…

FinalRecon : The Last Web Recon Tool You’ll Need

5 years ago

FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new…

A Complete Security Protocols Guide That Use For Secure Online Transactions

5 years ago

Online security is gaining more importance than ever before. With cyber criminals adopting newer and more sophisticated ways of breaching…

Jaeles : The Swiss Army Knife For Automated Web Application Testing

5 years ago

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner. Installation…

AutoRDPwn : The Shadow Attack Framework

5 years ago

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This…

EvilApp : Phishing Attack Using An Android Application

5 years ago

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass…