Wednesday, April 1, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
Andriller : Software Utility With A Collection Of Forensic Tools For Smartphones

Andriller : Software Utility With A Collection Of Forensic Tools For Smartphones

Andriller is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically...
Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It...
Osmedeus

Osmedeus : Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability Scanning

Osmedeus allow you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target....
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages & UTF-8 Group

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python...
Bonesi : Tool For DDoS Botnet Simulator

Bonesi : Tool For DDoS Botnet Simulator

BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a tested environment on the...
WebvulScan

WebvulScan – Web Application Vulnerability Scanner

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used...

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r...
AVG Antivirus

AVG Antivirus – Is It Good For Your Computer?

AVG is always in the top 5 of the 2019 antivirus rankings. Many people use it because it is...
WMD

WMD – Weapon of Mass Destruction

WMD is a python tool with an accumulation of IT security software. The product is incapsulated in "modules". The modules...
Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting...

Must Need

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail +...

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases uploaded on...
Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien tool launches attack on k8s cluster from within. That means you already need to have an access with permission to deploy...
0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
Shelly : Simple Backdoor Manager With Python

Shelly : Simple Backdoor Manager With Python

Shelly adalah sebuah tool sederhana yang ditulis menggunakan Python, yang berfungsi untuk meremote sebuah website. Installation

Anti-DDoS : Anti DDOS Bash Script To Defend Against DDOS Attacks

An open source project developed against the DOS and DDoS attack by writing iptables rules into the Linux OS is called the Anti-DDoS project. We...
Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of PyQt5 & Frida

Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of...

Dwarf is a debugger for reverse engineers, crackers and security analyst. Or you can call it damn, why are raspberries so fluffy...
Anti-Phishing Tools

Cloud-Based Anti-Phishing Tools Can Help Prevent Phishing Attempts By Cybercriminals

Phishing has, is, and will always remain a threat. The most advanced cloud-based anti-phishing tools are there to help you not only...