Wednesday, November 14, 2018
Home Authors Posts by Ranjith

Ranjith

296 POSTS 0 COMMENTS
A nonchalant person with a dexterity for writing and working as a Support Engineer at COMODO Security Inc. Editor-in-Chief, Author & Co-Founder of Tech-Soft.

Must Need

SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords ,...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
ReconDog

ReconDog – Reconnaissance Swiss Army Knife

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon them All the information...
Blind-Bash

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide...
ct-exposer

ct-exposer : An OSINT Tool That Discovers Sub-Domains By Searching Certificate...

ct-exposer will query the CT logs for a given domain, and then try to do DNS lookups for the domains to see which ones...
Phishing Frenzy

Phishing Frenzy – Ruby on Rails Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the...