Monday, March 30, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source...
Rock-ON : All In One Recon Tool That Will Just Get A Single Entry Of The Domain Name & Do All Of The Work Alone

Rock-ON : All In One Recon Tool That Will Just Get A Single Entry...

Rock-On is a all in one recon tool that will help your Recon process give a boost....
AutoSploit and AutoScanner

AutoNSE – Massive NSE AutoSploit and AutoScanner

Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and...
Skiptracer

Skiptracer – OSINT Python Webscaping Framework

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining...
Vboxdie Cracker

Vboxdie Cracker – Virtual Box Disk Image Encryption Password Cracker

Vboxdie Cracker is a virtual box disk image encryption password cracker. User password is stored using a combination of PBKDF2...
How to Hack a Mobile Phone With Just The Number

How to Hack a Mobile Phone With Just The Number

Hacking is one of those practices that almost attracts everybody, especially young teenagers. In this modern era of...

A Closer Look At The Brushless DC Electric Motor

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of...
Pwndb

Pwndb : Search For Leaked Credentials

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name.
DrSemu : Malware Detection & Classification Tool Based on Dynamic Behavior

DrSemu : Malware Detection & Classification Tool Based on Dynamic Behavior

DrSemu is a malware Detection and Classification Tool Based on Dynamic Behavior. It runs executables...

Must Need

Functrace : A Function Tracer

Functrace : A Function Tracer

Functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO. These are some implemented features...
ThreatIngestor  : Extract & Aggregate Threat Intelligence

ThreatIngestor : Extract & Aggregate Threat Intelligence

ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and...
SysWhispers  : AV/EDR Evasion Via Direct System Calls

SysWhispers : AV/EDR Evasion Via Direct System Calls

SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported from...
hideNsneak

hideNsneak – A CLI For Ephemeral Penetration Testing

hideNsneak application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various cloud services....
Recon NG : Open Source Intelligence Gathering Tool Aimed At Reducing The Time Spent Harvesting Information From Open Sources

Recon NG : Open Source Intelligence Gathering Tool Aimed At Reducing...

Recon NG is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source ...
CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
Ridrelay

RidRelay – Easy Way To Get Domain Usernames While On An...

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and...