Kali Linux

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There…

6 years ago

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities…

6 years ago

theZoo – A Repository Of LIVE Malwares For Your Own Joy & Pleasure

theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis to have access…

6 years ago

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I…

6 years ago

Nemesis – A Command Line Network Packet Crafting & Injecting Utility

The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems.…

6 years ago

Tool-X : Kali Linux Hacking Tool Installer

Tool-X is a Kali linux hacking Tool installer, with the help of it you can install best hacking tools in…

6 years ago

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python…

6 years ago

UploadScanner : HTTP file upload scanner for Burp Proxy

UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a…

6 years ago

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment.…

6 years ago

GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target…

6 years ago