Metadata-Attacker : A Tool To Generate Media Files With Malicious Metadata

7 years ago

Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file…

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-factor Authentication

7 years ago

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to…

Infog – Information Gathering Tool

7 years ago

InfoG is a Shellscript to perform Information Gathering. Infog Features Check Website info Check Phone info IP Tracker Check Valid…

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

7 years ago

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant…

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid Filtering

7 years ago

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high…

imR0T – Encryption to Your Whatsapp Contact

7 years ago

imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with…

RemoteRecon – Remote Recon and Collection

7 years ago

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often…

ReconDog – Reconnaissance Swiss Army Knife

7 years ago

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon…

AutoRDPwn – The Shadow Attack Framework

7 years ago

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability…

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

7 years ago

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its…