Vproxy – Forward HTTP/S Traffic To Proxy Instance

8 years ago

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't…

The Android Application Developer Guide: Converting an iOS App to Android

8 years ago

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many…

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native Netsh Client

8 years ago

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage…

MacSubstrate – Tool For Interprocess Code Injection On macOS

8 years ago

MacSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS.…

Fluxion – Remake Of Linset By VK496 With Less Bugs & Enhanced Functionality

8 years ago

Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a…

RidRelay – Easy Way To Get Domain Usernames While On An Internal Network

8 years ago

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common…

WindowsSpyBlocker – Block Spying & Tracking On Windows

8 years ago

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows…

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting & Research

8 years ago

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line…

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

8 years ago

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search…

PCILeech – Direct Memory Access (DMA) Attack Software

8 years ago

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA…