Monday, January 20, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System

Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System

Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and...
XSS-Payload-List

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign...
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download...
LNK-KISSER : AutoIt HackTool, Shortcuts.lnk Payloads Generator

LNK-KISSER : AutoIt HackTool, Shortcuts.lnk Payloads Generator

LNK-KISSER is an autoIt hackTool, shortcuts.lnk payloads generator. Exploiting Powershell to make ShortCut Payloads .There...
Miasm

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary...
Vulnx : CMS & Vulnerabilities Detector & An Intelligent Bot Auto Shell Injector

Vulnx : CMS & Vulnerabilities Detector & An Intelligent Bot Auto Shell Injector

Vulnx is a cms and vulnerabilities detection, an intelligent auto shell injector, fast cms detection of target and fast scanner...
Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There...
Why should you build your next app with Flutter?

Why should you build your next app with Flutter?

If you want to stay up to date, you will need to develop an app for your...

Trape – People Tracker On The Internet

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in...
Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge...

Must Need

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of...
MalwareCMDMonitor

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On...

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In a nutshell, it downloads...
Vulnx : An Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS

Vulnx : An Intelligent Bot Auto Shell Injector That Detect Vulnerabilities...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the...
Hershell

Hershell – Simple TCP Reverse Shell Which Can Work On Multiple...

Hershell is a simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint...
LOLBAS

LOLBAS – Living Off The Land Binaries And Scripts

LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy frontend...
CloudBunny

CloudBunny – CloudBunny Is A Tool To Capture The Real IP...

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool...
Ridrelay

RidRelay – Easy Way To Get Domain Usernames While On An...

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and...