GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment

7 years ago

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target…

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

7 years ago

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others.…

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

7 years ago

Spykeyboard is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail…

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

7 years ago

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation…

Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248

7 years ago

Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect…

SQLMap – SQL Injection & Database Automatic Takeover Tool

7 years ago

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking…

Ducky Exploit – Arduino Rubber Ducky Framework

7 years ago

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on…

BillCipher – Information Gathering tool for a Website or IP address

7 years ago

BillCipher version 2.2 is a information Gathering tool for a Website or IP address, use some ideas from Devploit. BillCipher…

Microctfs – Small CTF challenges running on Docker

7 years ago

Microctfs is a tool for small CTF challenges running on Docker. Microctfs Logviewer Build and Start logviewer challenge exposed on…

Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts

7 years ago

Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities…