BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It…
Open-source intelligence or OSINT Resources is data gathering from freely accessible sources to be utilized as a part of a…
JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component…
OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices…
Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference…
Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like…
Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs…
SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of…
Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and…
WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your…