Kali Linux

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for…

6 years ago

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's…

6 years ago

Tallow – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any…

6 years ago

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the…

6 years ago

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a…

6 years ago

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large…

6 years ago

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can…

6 years ago

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash…

6 years ago

SAWEF – Send Attack Web Forms

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with…

6 years ago

Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired…

6 years ago