Rootstealer – Trick To Inject Commands On Root Terminal

6 years ago

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

6 years ago

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find…

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

6 years ago

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization…

Raptor WAF – Web application firewall using DFA

6 years ago

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting…

RouterSploit – Exploitation Framework For Embedded Devices

6 years ago

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules…

Blind-Bash : Project To Obfuscate Your Bash Code

6 years ago

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the…

Joomscan – OWASP Joomla Vulnerability Scanner Project

6 years ago

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of…

Social Mapper – A Social Media Enumeration & Correlation Tool

6 years ago

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is…

Mr SIP : SIP-Based Audit and Attack Tool

6 years ago

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in…

WarChild – Denial Of Service Testing Suite Made For Analyzing

6 years ago

Warchild is a denial of service testing suite made for analyzing the strength of your website against different kinds of…