Wednesday, August 22, 2018

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

wifiphisher

Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access...

Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It...
Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
BLEAH

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead...
Gcat

Gcat – Sneaking Backdoor Use Gmail As A Command &...

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...
Social Mapper

Social Mapper – A Social Media Enumeration & Correlation Tool

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package, we've seen a good...