Vproxy – Forward HTTP/S Traffic To Proxy Instance

0

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all of the HTTP/S traffic using your favorite proxy program ? use this tool to solve this issue and capture the whole HTTP/S traffic. Vproxy System Requirements Linux Python 2.x Also Read Win-PortFwd : Powershell Script To Setup Windows...

The Android Application Developer Guide: Converting an iOS App to Android

0

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change to Android on the off chance that they haven't as of now and all things considered. Holding more than 75 percent of the world's mobile OS piece of the overall industry, Android offers a huge...

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native Netsh Client

0

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .win-portfwd.ps1 Also Read MacSubstrate – Tool For Interprocess Code Injection On macOS Example : Note: This script require admin privileges to run, this script will automatically try to elevate the privileges if you are running this script under normal user privileges.

MacSubstrate – Tool For Interprocess Code Injection On macOS

0

MacSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS. Using macSubstrate, you can inject your plugins (.bundle or .framework) into a mac app (including sandboxed apps) to tweak it in the runtime. All you need is to get or create plugins for your target app. No trouble with...

Fluxion – Remake Of Linset By VK496 With Less Bugs & Enhanced Functionality

0

Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release...

RidRelay – Easy Way To Get Domain Usernames While On An Internal Network

0

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and RID cycling to get a list of domain usernames. It takes these steps: Spins up an SMB server and waits for an incoming SMB connection The incoming credentials are relayed to a specified target, creating...

WindowsSpyBlocker – Block Spying & Tracking On Windows

0

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. Configuration file app.conf is generated at first launch :         Also Read Shodanwave – Tool For Exploring & Obtaining Information From Cameras WindowsSpyBlocker Telemetry...

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting & Research

0

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line version of the tool, but it is no longer under development so you should get the GUI version. It has some prerequisites. As it turns out, things like ruby and Qt are difficult to bundle into a stand-alone installer. While...

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

0

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that makes it easy to search for cameras online. What does the tool to? Look, a list! Search Brute force SSID and WPAPSK Password Disclosure E-mail, FTP, DNS, MSN Password Disclosure Exploit This is an example of shodan...

PCILeech – Direct Memory Access (DMA) Attack Software

0

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system. PCILeech supports multiple memory acquisition devices. Primarily hardware based, but also dump files and software based techniques based on select security issues are supported. USB3380 based hardware is only able...