Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

7 years ago

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool,…

Rootstealer – Trick To Inject Commands On Root Terminal

7 years ago

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

7 years ago

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find…

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

7 years ago

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization…

Raptor WAF – Web application firewall using DFA

7 years ago

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting…

RouterSploit – Exploitation Framework For Embedded Devices

7 years ago

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules…

Blind-Bash : Project To Obfuscate Your Bash Code

7 years ago

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the…

Joomscan – OWASP Joomla Vulnerability Scanner Project

7 years ago

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of…

Social Mapper – A Social Media Enumeration & Correlation Tool

7 years ago

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is…

Mr SIP : SIP-Based Audit and Attack Tool

7 years ago

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in…