Wednesday, April 8, 2020

Kali Linux

The Main page of Kali

Kali Linux

Home Kali Linux
The Main page of Kali
DVNA : Damn Vulnerable NodeJS Application

DVNA : Damn Vulnerable NodeJS Application

Damn Vulnerable NodeJS Application (DVNA) is a simple NodeJS application to demonstrate OWASP Top 10 Vulnerabilities and guide...
PrivescCheck : Privilege Escalation Enumeration Script for Windows

PrivescCheck : Privilege Escalation Enumeration Script for Windows

PrivescCheck script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules...
Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge...

Best SEO training course for beginners by moz in 2019

As the years are passing, businesses under different niches have reached millions of people for various reasons. Also,...
FOCA : Tool To Find Metadata & Hidden Information In The Documents

FOCA : Tool To Find Metadata & Hidden Information In The Documents

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These...
How to Hack a Mobile Phone With Just The Number

How to Hack a Mobile Phone With Just The Number

Hacking is one of those practices that almost attracts everybody, especially young teenagers. In this modern era of...
Findomain : Fastest & Cross-Platform Subdomain Enumerator

Findomain : Fastest & Cross-Platform Subdomain Enumerator

Findomain is a fastest and cross-platform subdomain enumerator. It comparison gives you a idea why you...
AutoRecon : Multi Threaded Network Reconnaissance Tool

AutoRecon : Multi Threaded Network Reconnaissance Tool

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a...
Pftriage

Pftriage : Python Tool & Library To Help Analyse Files During Malware Triage &...

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view...

Must Need

Lockdoor Framework : A Penetration Testing Framework with Cyber Security Resources

Lockdoor Framework : A Penetration Testing Framework with Cyber Security Resources

LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions...
Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...
DrSemu : Malware Detection & Classification Tool Based on Dynamic Behavior

DrSemu : Malware Detection & Classification Tool Based on Dynamic Behavior

DrSemu is a malware Detection and Classification Tool Based on Dynamic Behavior. It runs executables in an isolated environment,...

GTRS – Google Translator Reverse Shell 2018

GTRS tools uses Google Translator as a proxy to send arbitrary commands to an infected machine. ==HTTPS==> ==HTTP==> GTRS Environment Configuration First you need a...
eggshell

EggShell – Remote Administration Tool For iOS/macOS

EggShell is a post misuse surveillance instrument written in Python. It gives you a command line session with additional usefulness amongst you and an...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration...

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's a java executable and...
Mail Password Sniffer

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through...

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the network. It automatically recognizes...