Tallow – Transparent Tor for Windows

6 years ago

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any…

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network

6 years ago

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the…

Best Exploit Development Resources For Simulated Attacks

6 years ago

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a…

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

6 years ago

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large…

How to use Masscan to Enumerate Large Number of Hosts Quickly

6 years ago

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can…

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

6 years ago

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash…

SAWEF – Send Attack Web Forms

6 years ago

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with…

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

6 years ago

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods…

Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server

6 years ago

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired…

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

6 years ago

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems…