Friday, April 19, 2019
Home Tags Debian

Tag: Debian

Must Need

hydra

Online Password Bruteforce with Hydra-GTK

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like telnet, ssh, http, https,...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
AWS Key Disabler

AWS Key Disabler – Lambda Script That Will Disable Access Keys...

The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to...
Ducky Exploit

Ducky Exploit – Arduino Rubber Ducky Framework

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on ; Kali Linux 18.2 ...
Telewreck

Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248

Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect vulnerable versions of Telerik Web...
JCS

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database...
Winspy

Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP...

WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisene. Dependencies metasploit-framework xterm apache2 Also ReadEvilginx2 – Standalone MITM Attack Framework Used For...