Monday, January 27, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Fern Wifi Cracker

Fern Wifi Cracker For Wireless Security

Fern Wifi Cracker is a Wireless security evaluating and assault software program composed utilizing the Python Programming Language and the...
AndroL4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis – AndroL4b

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises...
Python RAT

Stitch A Cross Platform Python Remote Administration Tool

This is a cross-platform python framework that permits you to create custom payloads for Windows, Mac OSX, and UNIX moreover....
Hijacker

All-in-One Wi-Fi Cracking Tools for Android – Hijacker v1.5

Hijacker v1.5 is a Graphical User Interface for the penetration testing instruments Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a...
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled...

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent...
Concrete5 CMS

Vulnerability Scanner And Information Gatherer For The Concrete5 CMS – C5Scan

Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor. Concrete5...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can...
Androl4b

Androl4b – Android Security Virtual Machine

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and...

Must Need

Sherlock : Find Usernames Across Social Networks

Sherlock : Find Usernames Across Social Networks

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python 3.6 or...
dnsniff macof

macof

MAC Flooding with MACOF & some major countermeasures Macof is a member of the Dsniff suit toolset and mainly used to flood the switch on...
KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network, the program also allows you to perform...
Goblin : An Impish, Cross-Platform Binary Parsing Crate, Written In Rust

Goblin : An Impish, Cross-Platform Binary Parsing Crate, Written In Rust

Goblin is an impish, cross-platform binary parsing crate, written in Rust. It supports: An ELF32/64 parser, and raw...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application...
Maryam : Open-source Intelligence(OSINT) Framework

Maryam : Open-source Intelligence(OSINT) Framework

Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion,...