RecScanSec – Reconnaisance Scanner Security

6 years ago

RecScanSec made for reconnaisance Scanner and information gathering with an emphasis on simplicity. Following are the features of the scanner; Information Security…

TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

6 years ago

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS,…

WhatWeb : Next Generation Web Scanner

6 years ago

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content…

Recsech – Tool For Doing Footprinting & Reconnaissance On The Target Web

6 years ago

Recsech is a tool for doing  Footprinting and Reconnaissance on the target web. It collects information such as DNS Information, Sub…

ShellPhish : Phishing Tool For 18 Social Media

6 years ago

ShellPhish is a phishing Tool for 18 social media like Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin,…

Zydra : Password Recovery Tool & Linux Shadow File Cracker

6 years ago

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force…

GhostDelivery : .VBS Script To Deliver Payload With Persistence

6 years ago

GhostDelivery is a python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus…

ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

6 years ago

ReverseTCPShell is a tool for Reverse Encrypted (AES 256-bit) Shell over TCP using PowerShell SecureString. Attacker (C2-Server Listener): PS> .\ReverseTCP.ps1…

RIPVT : Virus Total API Maltego Transform Set For Canari

6 years ago

ripVT is a Maltego Canari transforms for Virus Total private API. Provided AS-IS, no warranties, no guarantees. No jokes in…

PcapXray : Tool To Visualize A Packet Capture Offline

6 years ago

PcapXray is a Network Forensics Tool to visualize a Packet Capture offline as a Network Diagram including device identification, highlight…