R K

Tallow – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any…

8 years ago

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the…

8 years ago

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a…

8 years ago

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large…

8 years ago

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash…

8 years ago

SAWEF – Send Attack Web Forms

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with…

8 years ago

Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired…

8 years ago

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems…

8 years ago

Nipe- Script To Make Tor Network Your Default Gateway

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables…

8 years ago

FireMaster – The Firefox Master Password Recovery Tool

FireMaster is the principal ever tool created to recoup your lost or overlooked Master Password of Firefox utilizing easy to…

8 years ago