Pypykatz : Mimikatz Implementation In Pure Python

5 years ago

Pypykatz is a mimikatz implementation in pure Python and can be runs on all OS's which support python>=3.6. Installing Install…

3 Reasons to Use a VPN in a Net Neutrality-Free World

5 years ago

In the early days of the internet, internet communication was impartial. Data relaying was not influenced by ISPs based on…

Token Reverser : Word List Generator To Crack Security Tokens

5 years ago

Token Reverser is a word list generator to crack security tokens. Example Use Case You are testing reset password functionReset…

ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce

5 years ago

ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as…

AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

5 years ago

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names Also Read - Betwixt :…

Jeopardize : A Low Cost Threat Intelligence&Response Tool

5 years ago

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response…

Tea : SSH-Client Worm

5 years ago

Tea is a ssh-client worm made with tas framework. How it works? This is a fakessh-client that manipulates the tty…

Microsoft WinUI : Windows UI Library Roadmap

5 years ago

WinUI is the native UI platform for Windows 10. This document outlines the prospective roadmap for new website through 2019…

Zelos : A Comprehensive Binary Emulation Platform

5 years ago

Zelos is a comprehensive binary emulation platform. It (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of it is…

Pickl3 : Windows Active User Credential Phishing Tool

5 years ago

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational…