Thursday, June 27, 2019

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving...
VXScan : Python3 Comprehensive Scanning Tool

VXScan : Python3 Comprehensive Scanning Tool

VXScan is a Python3 comprehensive scanning tool, mainly used for sensitive file detection (directory scanning and js leak...
Windows Hacks : Creative & Unusual Things That Can Be Done With The Windows API

Windows Hacks : Creative & Unusual Things That Can Be Done With The Windows...

Windows Hacks is a creative and unusual things that can be done with the Windows API.
SwiftMonkey : A Framework For Doing Randomised UI Testing Of iOS Apps

SwiftMonkey : A Framework For Doing Randomised UI Testing Of iOS Apps

SwiftMonkey project is a framework for generating randomised user input in iOS apps. This kind of monkey testing...
BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers

BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux...

BlueGhost tool utilises various Linux network tools and bash scripting to assist blue teams on defending Debian and...
Simplify : Generic Android Deobfuscator

Simplify : Generic Android Deobfuscator

Simplify virtually executes an app to understand its behaviour and then tries to optimise the code so that...
WhatBreach

WhatBreach : OSINT Tool To Find Breached Emails & Databases

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a...

BoomER : Framework For Exploiting Local Vulnerabilities

BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
MozDef: Mozilla Enterprise Defense Platform

MozDef: Mozilla Enterprise Defense Platform

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage,...

Must Need

Tallow

Tallow – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be...
Stardox

Stardox – Github Stargazers Information Gathering Tool

Stardox is an advanced github stargazers information gathering tool. It scraps Github for information and display them in list tree view.It can...
MySQL

MySQL Magic: Dump MySQL Client Password From Memory

I made this just for fun, use for illegal purposes are not allowed. The mysql client read the password, then write this...
CommandoVM

CommandoVM : Windows-Based Security Distribution for Penetration Testing

Welcome to CommandoVM a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script)
Twitter-Intelligence

Twitter-Intelligence : OSINT Project Performs Tracking & Analysis Of The Twitter

Twitter-Intelligence is a project written in Python to twitter tracking and analysis without using Twitter API. This project is a Python 3.x application. The...
Chomp-Scan

Chomp-Scan : A Scripted Pipeline of Tools To Streamline The Bug...

Chomp-Scan is a scripted pipeline of tools to simplify the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs....
QRGen : Simple Script for Generating Malformed QRCodes

QRGen : Simple Script for Generating Malformed QRCodes

QRGen is wrote this little script to generate generic Malformed QRCodes. These qrcodes are useful if you want to test some QRCode...