Wednesday, January 16, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

Raptor WAF

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
wifiphisher

Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access...

Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It...
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
Leaked

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...
Apfell

Apfell – A MacOS, Post-Exploit, Red Teaming Framework

Apfell is a macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....

GTRS – Google Translator Reverse Shell 2018

GTRS tools uses Google Translator as a proxy to send arbitrary commands to an infected machine. ==HTTPS==> ==HTTP==> GTRS Environment Configuration First you need a...