Kali Linux

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a…

7 years ago

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large…

7 years ago

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can…

7 years ago

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash…

7 years ago

SAWEF – Send Attack Web Forms

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with…

7 years ago

Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired…

7 years ago

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems…

7 years ago

Nipe- Script To Make Tor Network Your Default Gateway

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables…

7 years ago

FireMaster – The Firefox Master Password Recovery Tool

FireMaster is the principal ever tool created to recoup your lost or overlooked Master Password of Firefox utilizing easy to…

7 years ago

Gpredict – Satellite Tracking Application

Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation…

7 years ago