Friday, August 23, 2019
Home Tags Bluetooth device

Tag: bluetooth device

bluelog

Bluelog

Must Need

Kippo – SSH Honeypot

Kippo – SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...
Sh00t

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy,...
Exrex

Exrex : Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular...
ShellPhish : Phishing Tool For 18 Social Media

ShellPhish : Phishing Tool For 18 Social Media

ShellPhish is a phishing Tool for 18 social media like Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin,...
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...
Psad

Psad : Intrusion Detection & Log Analysis with IPtables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect...
Brutality : A Fuzzer For Any GET Entries

Brutality : A Fuzzer For Any GET Entries

A Brutality is a fuzzer for any GET entries and following are the features ; Multi-threading on demandFuzzing, bruteforcing...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout