Wednesday, October 16, 2019
Home Tags Bluetooth device

Tag: bluetooth device

bluelog

Bluelog

Must Need

RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
Best Hacking Books

Best Hacking Books, Tools & Resources 2018

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...
10minutemail : Python Temporary Email

10minutemail : Python Temporary Email

10minutemail.net is a free, disposable e-mail service. Your temporary e-mail address will expire after 10 minutes, after which you cannot access it....
OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.
Prithvi – Report Generation Tool

Prithvi – Report Generation Tool

Prithvi is a report generation tool specially made for Security Assessment which is free to use and easy to use. It will...
Hacktronian : All in One Hacking Tool for Linux & Android

Hacktronian : All in One Hacking Tool for Linux & Android

Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs.