Kali Linux

Evil SSDP : Create Fake UPnP Devices To Phish For Credentials

Evil SSDP responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear…

5 years ago

Proton : Windows Post-Exploitation Framework Similar

Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it does…

5 years ago

NTLMRecon : Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints

NTLMRecon is built with flexibilty in mind. A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find…

5 years ago

HoneyBot : Capture, Upload & Analyze Network Traffic

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides…

5 years ago

HTTP Asynchronous Reverse Shell

Http asynchronous reverse shell is a tool used for asynchronous reverse shell using the HTTP protocol. Why ? Today there…

5 years ago

Entropy : Set Of Tools To Exploit Netwave & GoAhead IP Webcams

Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for…

5 years ago

SharpRDP : RDP Application For Authenticated Command Execution

SharpRDP is a Remote Desktop Protocol Console Application for Authenticated Command Execution. Building To compile open the project in Visual…

5 years ago

Ghost : Android Debug Bridge To Remotely Access An Android Device

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. It…

5 years ago

Raspberry Pi Imager Utility 2020

The main code of Raspberry Pi Imager Imaging Utility is made available under the terms of the Apache license. See…

5 years ago

Extended XSS Search : A Better Version Of My XSSFinder Tool

Extended XSS Searcher is the is the extended version based on the initial idea already published as "xssfinder". This private…

5 years ago