Wednesday, March 20, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

No posts to display

Must Need

OWTF

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...
MacSubstrate

MacSubstrate – Tool For Interprocess Code Injection On macOS

MacSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS. Using macSubstrate, you can...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious...

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence sources can...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
IP Obfuscator

IP Obfuscator – Simple Tool to Social Engineer and Bypass Firewall

IP Obfuscator is a simple python script which converts an IP address into different obfuscated forms like integer, hexadecimal or into an...
libsodium

Libsodium – Easy To Use Software Library

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It...
CredSniper

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...