Sunday, January 24, 2021
Home Tags Blackeye

Tag: Blackeye

Must Need

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The...
Leprechaun : Tool Used To Map Out Network Data Flow To Help Penetration Testers

Leprechaun : Tool Used To Map Out Network Data Flow To...

Leprechaun purpose of this tool is to help penetration testers identify potentially valuable targets on the internal network environment. By aggregating netstat...
Usbrip : Simple CLI Forensics Tool For Tracking USB Device Artifacts

Usbrip : Simple CLI Forensics Tool For Tracking USB Device Artifacts

Usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics tool with CLI interface that lets you keep...
Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents

Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents

Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents....
InQL : A Burp Extension For GraphQL Security Testing

InQL : A Burp Extension For GraphQL Security Testing

InQL is a security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script or...
Moriarty Project : This Tool Gives Information About The Phone Number That You Entered

Moriarty Project : This Tool Gives Information About The Phone Number...

Moriarty is a tool that tries to find good information about the phone number that you provided Tries To...
IP-Biter

IP-Biter : The Hacker-friendly E-Mail Tracking Framework

IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed in e-mails,...