BeRoot – Tool To Check Common Windows Mis-configurations

6 years ago

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It…

Best OSINT Resources To Gather Information From Free Tools Or Resources

6 years ago

Open-source intelligence or OSINT Resources is data gathering from freely accessible sources to be utilized as a part of a…

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

6 years ago

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component…

OverThruster – HID Attack Payload Generator For Arduinos

6 years ago

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices…

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

6 years ago

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference…

Online Password Bruteforce with Hydra-GTK

6 years ago

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like…

Evilginx – MITM Attack Framework For Phishing Credentials & Session Cookies

6 years ago

Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs…

SPF – SpeedPhish Framework For Phishing Exercises

6 years ago

SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of…

Ghost Phisher – Wireless & Ethernet Attack Software Application

6 years ago

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and…

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

6 years ago

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your…