Kali Linux

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell (SSH)…

6 years ago

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral…

6 years ago

Top 10 Best Web Hacking Tools

Here is the best web hacking tools that helps you in pen-testing and protecting the websites. Burp Suite: Burp Suite…

6 years ago

Egress Assess : Tool Used to Test Egress Data Detection Capabilities

Egress Assess is a tool used to test egress data detection capabilities. To setup, run the included setup script, or…

6 years ago

Fibratus : Tool for Exploration & Tracing of the Windows Kernel

Fibratus is a tool which is able to capture the most of the Windows kernel activity - process/thread creation and termination,…

6 years ago

Kaboom : Script That Automates The Penetration Test

Kaboom is a script that automates the penetration test. It performs several tasks for each phases of pentest: Information gathering…

6 years ago

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps & Rename Chromecast Device

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast device(s) obtained from…

6 years ago

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many computers are…

6 years ago

Pftriage : Python Tool & Library To Help Analyse Files During Malware Triage & Analysis

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view and extract…

6 years ago

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily.…

6 years ago