Kali Linux

Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook & Gmail Credentials

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers. Unlike other…

6 years ago

Wordlistctl : Fetch, Install & Search Wordlist Archives From Websites & Torrent Peers

Wordlistctl is a script to fetch, install, update and search wordlist archives from websites offering wordlists with more than 2900…

6 years ago

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in Electron Applications

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can use…

6 years ago

SALT – SLUB ALlocator Tracer for the Linux Kernel

Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit,…

6 years ago

Reko : A General Purpose Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available…

6 years ago

PHP : Security Check List 2019

PHP : Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML.…

6 years ago

Beef : The Browser Exploitation Framework Project

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.…

6 years ago

SecLists : Security Tester’s Companion For Security Assessments

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in…

6 years ago

WAF ByPass : Firewall Bypass Script Based On DNS History Records

Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if…

6 years ago

Pompem : Tool For Exploits & Vulnerability in Database

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.…

6 years ago