Kali Linux

Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool,…

7 years ago

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal…

7 years ago

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find…

7 years ago

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization…

7 years ago

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting…

7 years ago

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules…

7 years ago

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the…

7 years ago

Joomscan – OWASP Joomla Vulnerability Scanner Project

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of…

7 years ago

Social Mapper – A Social Media Enumeration & Correlation Tool

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is…

7 years ago

Mr SIP : SIP-Based Audit and Attack Tool

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in…

7 years ago