Wednesday, April 14, 2021

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

PurpleCloud : An Infrastructure As Code (IaC) Deployment Of A Small Active Directory Pentest Lab In The Cloud

PurpleCloud : An Infrastructure As Code (IaC) Deployment Of A Small...

Pentest Cyber Range for a small Active Directory Domain. Automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud!...
Reverse APK

Reverse APK – Quickly Analyze & Reverse Engineer Android Packages

Using Reverse APK you will have the option to quickly analyze and reverse engineer Android applications. FEATURES Of Reverse APK Displays all extracted files for...
Wacker : A WPA3 Dictionary Cracker

Wacker : A WPA3 Dictionary Cracker

Wacker is a set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant...
Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....

Web Scraping: Top 4 ways to use in business

Web Scraping is like an engine of power, incredibly powerful. Whether a startup idea just grows on your mind or you are...
Lazydocker : The Lazier Way To Manage Everything Docker

Lazydocker : The Lazier Way To Manage Everything Docker

Lazydocker is a simple terminal UI for both docker and docker-compose, written in Go with the gocui library.
Writing Tools

Top 5 Writing Tools Every Linux Enthusiast Should Use

Good writing skills are very important and necessary especially to students and people that do professional writing. The quality of the final...