Wednesday, November 14, 2018

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Robber

Robber : Tool For Finding Executables Prone To DLL Hijacking

Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. So What Is DLL Hijacking? Windows...

BlobRunner – Quickly Debug Shellcode Extracted During Malware Analysis

BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and...
FindYara

FindYara – IDA Python Plugin To Scan Binary With Yara Rules

FindYara uses IDA python plugin to scan your binary with yara rules. All the yara rule matches will be listed...
ADModule

ADModule – Microsoft Signed ActiveDirectory PowerShell Module

ADModule is a Microsoft signed DLL for the ActiveDirectory PowerShell module. Just a backup for the Microsoft's ActiveDirectory PowerShell module from...
BFuzz

BFuzz – Fuzzing Chrome & Firefox Browsers

BFuzz is an input based fuzzer tool which take .html as an input, open's up your browser with a new...
DarkSpiritz

DarkSpiritz : A Penetration Testing Framework For Linux, MacOS, and Windows Systems

DarkSpiritz is a penetration testing framework for Linux and Windows systems. Created by the SynTel Team it was a project...
Killshot

Killshot : Information gathering Tool

KillShot is a Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner. You Can use this tool to Spider your...

PasteJacker : Hacking Systems With The Automation Of PasteJacking Attacks

PasteJacker the main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known...
XSStrike

XSStrike – Most Advanced XSS Detection Suite

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful...
Python-Nubia

Python-Nubia : A Command-Line & Interactive Shell Framework

Python-Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell...

Must Need

Sandsifter

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware...

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a processor's instruction set, and...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
AndroL4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware...

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various...
htrace.sh

htrace.sh – Simple Shell Script To Debugging Http/Https Traffic Tracing

htrace.sh simple shell script to debugging http/https traffic tracing, response headers and mixed-content. Scanning domain using Nmap NSE Library. Support external security tools: Mozilla...
Metateta

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are...
UBoat

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with no dependencies Encrypted C&C...
Mercure

Mercure – Tool For Security Managers Who Want To Train Their...

Mercure is a tool for security managers who want to train their colleague to phishing. What Mercure can do: Create email templates Create target lists ...