Friday, January 24, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Gophish : Open-Source Phishing Toolkit

Gophish : Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability...
Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with ...
Scallion : GPU-Based Onion Hash Generator

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs...
AntiCheat : Framework To Test Any Anti-Cheat

AntiCheat : Framework To Test Any Anti-Cheat

AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or...
Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to...
Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web...
Lsassy : Extract Credentials From Lsass Remotel

Lsassy : Extract Credentials From Lsass Remotel

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to...
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...
LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with...
Shell Backdoor List : PHP / ASP Shell Backdoor List

Shell Backdoor List : PHP / ASP Shell Backdoor List

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to...

Must Need

PHPMussel

PHPMussel : Anti-Virus Anti-Trojan Anti-Malware Solution

An ideal solution for shared hosting environments, where it's often not possible to utilise or install conventional anti-virus protection solutions,...
DrMemory : Memory Debugger for Windows, Linux, Mac & Android

DrMemory : Memory Debugger for Windows, Linux, Mac & Android

DrMemory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory...
Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope...
Flashmingo

Flashmingo : Automatic Analysis of SWF Files Based On Some Heuristics

FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing...
Prithvi – Report Generation Tool

Prithvi – Report Generation Tool

Prithvi is a report generation tool specially made for Security Assessment which is free to use and easy to use. It will...
Drltrace

Drltrace – A Library Calls Tracer For Windows & Linux Applications

Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO...

Docker-Inurlbr : Exploit GET / POST Capturing Emails & Urls

Docker-Inurlbr is a advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom...