Wednesday, July 28, 2021
Home Tags Applications

Tag: Applications

Must Need

iCULeak : Tool To Find & Extract Credentials From Phone Configuration Files Hosted On CUCM

iCULeak : Tool To Find & Extract Credentials From Phone Configuration...

iCULeak (iCULeak.py) is a tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call...
Pyrit

Pyrit : The Famous WPA Pre-Computed Cracker, Migrated from Google

Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the...
CRLFuzz : A Fast Tool To Scan CRLF Vulnerability Written In Go

CRLFuzz : A Fast Tool To Scan CRLF Vulnerability Written In...

CRLFuzz is a fast tool to scan CRLF vulnerability written in Go. Installation From Binary
Camelishing

Camelishing – Social Engineering Tool

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or...
SSF : Secure Socket Funneling Network Tool

SSF : Secure Socket Funneling Network Tool

Secure Socket Funneling (SSF) is a network tool and toolkit. It provides simple and efficient ways to forward data from multiple ...
Stegseek : Worlds Fastest Steghide Cracker, Chewing Through Millions Of Passwords Per Second

Stegseek : Worlds Fastest Steghide Cracker, Chewing Through Millions Of Passwords...

Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built as a...
SharpMapExec : A Sharpen Version Of CrackMapExec

SharpMapExec : A Sharpen Version Of CrackMapExec

SharpMapExec is a sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...