Kali Linux

Fawkes : Tool To Search For Targets Vulnerable To SQL Injection

Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine. Options…

5 years ago

Bheem : Tool To Carry Out Various Tools And Recon Process

Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process…

5 years ago

Bento : A Minimal Fedora-Based Container For Penetration Tests

A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and…

5 years ago

Scilla : Information Gathering Tool (DNS/Subdomain/Port Enumeration)

Scilla is a information gathering tool (DNS/Subdomain/Port Enumeration). Installation First of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla…

5 years ago

Freki : Malware Analysis Platform

Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse engineering;Provide an easy-to-use REST API…

5 years ago

Ghost : An Android Post-Exploitation Framework

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost…

5 years ago

ToRat : A Remote Administration Tool Written In Go Using Tor As A Transport Mechanism & RPC For Communication

ToRat is a Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows,…

5 years ago

WSMan-WinRM : Scripts For Executing Remote Commands Over WinRM Using The WSMan.Automation COM Object

WSMan-WinRM is a collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM…

5 years ago

Stegseek : Worlds Fastest Steghide Cracker, Chewing Through Millions Of Passwords Per Second

Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built…

5 years ago

Slipstreaming : NAT Slipstreaming Allows An Attacker To Remotely Access Any TCP/UDP Services

NAT Slipstreaming exploits the user's browser in conjunction with the Application Level Gateway (ALG) connection tracking mechanism built into NATs,…

5 years ago