Kali Linux

Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents

Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with…

5 years ago

QRLJacking : Hijack Services That Relies On QR Code Authentication

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all…

5 years ago

FinalRecon : The Last Web Recon Tool You’ll Need

FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new…

5 years ago

A Complete Security Protocols Guide That Use For Secure Online Transactions

Online security is gaining more importance than ever before. With cyber criminals adopting newer and more sophisticated ways of breaching…

5 years ago

Jaeles : The Swiss Army Knife For Automated Web Application Testing

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner. Installation…

5 years ago

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This…

5 years ago

EvilApp : Phishing Attack Using An Android Application

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass…

5 years ago

S3BucketList : Firefox Plugin That Lists Amazon S3 Buckets Found In Requests

S3BucketList is a Firefox plugin that records S3 Buckets found in requests. It is currently a work in progress and…

5 years ago

Locator : Geolocator, IP Tracker, Device Info by URL (Serveo & Ngrok)

Locator is a tool used for Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to…

5 years ago

Guardedbox : Online Client-Side Manager For Secure Storage & Secrets Sharing

GuardedBox is an open-source online client-side manager for secure storage and secrets sharing. It allows users to upload secrets to…

5 years ago