Friday, February 21, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the clear-text credentials...
BADministration : Tool Which Interfaces with Management or Administration Applications

BADministration : Tool Which Interfaces with Management or Administration Applications

BADministration is a tool which interfaces with management or administration applications from an offensive standpoint. It attempts to...

Update Nmap in Kali Linux

Install & Update Nmap in Kali Linux Rolling, Sana & earlier versions This tutorial will show you how to update nmap in kali linux 2.0....
Nuages : A Modular C2 Framework 2019

Nuages : A Modular C2 Framework 2019

Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must be developed...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
SSHTunnel : SSH Tunnels To Remote Server

SSHTunnel : SSH Tunnels To Remote Server

SSHTunnel is a tool for SSH tunnels to remote server. Installation sshtunnel is on PyPI,...