Monday, September 21, 2020
Home Tags Analysis

Tag: analysis

Must Need

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your...
NebulousAD : Automated Credential Auditing Tool

NebulousAD : Automated Credential Auditing Tool

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a...
Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls...
PFQ

PFQ : Functional Network Framework for Multi-Core Architectures

PFQ is a functional framework designed for the Linux operating system built for efficient packets capture/transmission (10G, 40G and beyond), in-kernel functional...
HackerTarget : Tools And Network Intelligence To Help Organisations With Attack Surface Discovery

HackerTarget : Tools And Network Intelligence To Help Organisations With Attack...

HackerTarget is tools and network intelligence to help organisations with attack surface discovery. Use open source tools and network intelligence to...
X64Dbg : An Open-Source X64/X32 Debugger For Windows

X64Dbg : An Open-Source X64/X32 Debugger For Windows

X64Dbg is an open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the...
MSSQLi-DUET : MSSQL Injection-based Domain User Enumeration Tool

MSSQLi-DUET : MSSQL Injection-based Domain User Enumeration Tool

SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various forms of...