Friday, August 23, 2019
Home fake_router6 fakerouter6-2

fakerouter6-2

fake_router6

Command

fake_router6
fake_router6

Must Need

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Phantom-Evasion

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most ...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...
Getsploit

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature...
Regipy : An OS Independent Python Library For Parsing Offline Registry Hives

Regipy : An OS Independent Python Library For Parsing Offline Registry...

Regipy is a python library for parsing offline registry hives. regipy has a lot of capabilities: Use as a...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference is that WAFs work...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout