Wednesday, February 20, 2019

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Crashcast

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps & Rename Chromecast Device

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast...
DDoS

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many...
Pftriage

Pftriage : Python Tool & Library To Help Analyse Files During Malware Triage &...

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view...
SSRFmap

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these...
LeakLooker

LeakLooker : Find open databases with Shodan

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script...
Malice

Malice : VirusTotal Wanna Be – Now with 100% more Hipster

Malice mission is to be a free open source version of VirusTotal that anyone can use at any...
ADAPT

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed...
Pwndb

Pwndb : Search For Leaked Credentials

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name.
PF_RING

PF_RING : High-Speed Packet Processing Framework

PF_RING is a Linux kernel module and user-space framework that allows you to process packets at high-rates while...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built...

Must Need

Bincat

Bincat : Binary Code Static Analyser With IDA Integration

BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation.
Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...
HashPump

HashPump – Tool To Exploit Hash Length Extension Attack In Various...

HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump...
Apfell

Apfell – A MacOS, Post-Exploit, Red Teaming Framework

Apfell is a macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for...
Hackertarget

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...
Ache

Ache – Web Crawler For Domain-Specific Search

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to a given domain or...
Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...