Kali Linux

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often…

6 years ago

ReconDog – Reconnaissance Swiss Army Knife

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon…

6 years ago

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability…

6 years ago

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its…

6 years ago

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class…

6 years ago

EKFiddle – A framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising & Malicious Traffic In General

EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.…

6 years ago

DigiDuck – Framework for Digiduck Development Boards Running ATTiny85 Processors & Micronucleus Bootloader

Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is…

6 years ago

Clrinject – Injects C# EXE or DLL Assembly Into every CLR Runtime and AppDomain Of Another Process

Clrinject injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can…

6 years ago

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware Bugs

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a…

6 years ago

Docker Tor Hidden Service Nginx – Easily Setup A Hidden Service Inside The Tor Network

Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the…

6 years ago