Sunday, August 25, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator is an obfuscate a python code 2.x and 3.x. Takes a python source code and transform it into an obfuscated...
AutoSource : Automated Source Code SonarQube

AutoSource : Automated Source Code SonarQube

AutoSource is an automated source code review framework integrated with SonarQube which is capable of performing static code analysis/reviews.
RapidScan : The Multi-Tool Web Vulnerability Scanner

RapidScan : The Multi-Tool Web Vulnerability Scanner

RapidScan is the multi tool web vulnerability scanner. It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning...
PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...
Project iKy – Tool To Collects Information From An Email

Project iKy – Tool To Collects Information From An Email

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.
Security RAT : Tool For Handling Security Requirements In Development

Security RAT : Tool For Handling Security Requirements In Development

OWASP Security RAT (Requirement Automation Tool) is a tool supposed to assist with the problem of addressing security requirements during application development. The...
WhatBreach

WhatBreach : OSINT Tool To Find Breached Emails & Databases

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout