Friday, August 23, 2019
Home Tags Data Analysis

Tag: Data Analysis

Must Need

GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers

BlueGhost : Network Tool Designed To Assist Blue Teams In Banning...

BlueGhost tool utilises various Linux network tools and bash scripting to assist blue teams on defending Debian and Ubuntu based servers from...
DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the Github Repositories

DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the...

DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The tool will flag the...
IDB

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting...

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line version of the tool,...
Aztarna

Aztarna – A Footprinting Tool For Robots

This repository contains Alias Robotic's aztarna, a footprinting tool for robots. Alias Robotics supports original robot manufacturers assessing...
Evilginx2

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to...
Joy : To Capture & Analyse Network Flow Data & Intraflow Data

Joy : To Capture & Analyse Network Flow Data & Intraflow...

Joy is a package for capturing and analysing network flow data and intraflow data, for network research, forensics, and...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout