Kali Linux

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't…

6 years ago

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many…

6 years ago

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native Netsh Client

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage…

6 years ago

MacSubstrate – Tool For Interprocess Code Injection On macOS

MacSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS.…

6 years ago

Fluxion – Remake Of Linset By VK496 With Less Bugs & Enhanced Functionality

Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a…

6 years ago

RidRelay – Easy Way To Get Domain Usernames While On An Internal Network

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common…

6 years ago

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows…

6 years ago

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting & Research

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line…

6 years ago

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search…

6 years ago

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA…

6 years ago