Wednesday, September 23, 2020
Home Tags CCat

Tag: CCat

Must Need

RedGhost : Linux Post Exploitation Framework

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

VideoProc Review – An Easy 4K Video Processing Software with GPU...

When you need to save 4K/HD videos from different sites, convert movies/music/DVD discs to popular format for flawless playback, or recording tutorials,...
EvilApp : Phishing Attack Using An Android Application

EvilApp : Phishing Attack Using An Android Application

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication...
SocialFish

SocialFish : Educational Phishing Tool & Information Collector

An app to remote control SocialFish. This app is an open-source project to remote control the application, it does not work independently....
TorghostNG : Make All Your Internet Traffic Anonymized With Tor Network

TorghostNG : Make All Your Internet Traffic Anonymized With Tor Network

TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3. Rewritten from...
Top 7 Best Open Source SQL Injection Tools – 2019

Top 7 Best Open Source SQL Injection Tools – 2019

SQL injection is a standout amongst the most widely recognised attacks against web applications. Here is the list of Best SQL Injection...
PostShell – Post Exploitation Bind/Backconnect Shell

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which...