Wednesday, June 16, 2021
Home Tags Anonymous OS

Tag: Anonymous OS

Must Need

Rainbow Crackalack : Rainbow Table Generation & Lookup Tools

Rainbow Crackalack : Rainbow Table Generation & Lookup Tools

Rainbow Crackalack project produces open-source code to generate rainbow tables as well as use them to look up password hashes. While...
Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by metasploit-framework, viper, cobalt strike for session online. Pystinger is developed in...
E013

E013 – WiFi Password Stealer For Microsoft Windows

A little VBScript E013 that steal Wifi passwords from Windows. Into the file WifiName.txt you can see the password of every saved wifi available on...
Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine is an Obfuscation-Neglect Android Malware Scoring System. Android malware analysis engine is not a new story. Every antivirus company...
Sploit : Go Package That Aids In Binary Analysis And Exploitation

Sploit : Go Package That Aids In Binary Analysis And Exploitation

Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit is to...
Win-PortFwd

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native...

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .win-portfwd.ps1 Also Read MacSubstrate –...
HackerEnv : Sweep IPs & Scan Ports, Vulnerabilities & Exploit Them

HackerEnv : Sweep IPs & Scan Ports, Vulnerabilities & Exploit Them

hackerEnv is an automation tool that quickly and easily sweep IPs and scan ports, vulnerabilities and exploit them. Then, it hands you...