Kali Linux

Jeopardize : A Low Cost Threat Intelligence&Response Tool

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response…

4 years ago

Tea : SSH-Client Worm

Tea is a ssh-client worm made with tas framework. How it works? This is a fakessh-client that manipulates the tty…

4 years ago

Zelos : A Comprehensive Binary Emulation Platform

Zelos is a comprehensive binary emulation platform. It (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of it is…

4 years ago

Pickl3 : Windows Active User Credential Phishing Tool

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational…

4 years ago

Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel

Betwixt is a web Debugging Proxy based on Chrome DevTools Network panel.Betwixt will help you analyze web traffic outside the…

4 years ago

Dirble : Fast Directory Scanning And Scraping Tool

Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy…

4 years ago

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes…

4 years ago

RedRabbit : Red Team PowerShell Script

RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam. The aim is to highlight just how…

4 years ago

Sifter : A Osint, Recon & Vulnerability Scanner

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order…

4 years ago

FuzzBench : Fuzzer Benchmarking As A Service

FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal…

4 years ago