Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file…
Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to…
InfoG is a Shellscript to perform Information Gathering. Infog Features Check Website info Check Phone info IP Tracker Check Valid…
SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant…
Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high…
imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with…
RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often…
Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon…
AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability…
Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its…