Tuesday, January 22, 2019
Home Tags Decrypt

Tag: Decrypt

Must Need

Hooker

Hooker : Automated Dynamic Analysis of Android Applications

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
Nemesis

Nemesis – A Command Line Network Packet Crafting & Injecting Utility

The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken...
BFuzz

BFuzz – Fuzzing Chrome & Firefox Browsers

BFuzz is an input based fuzzer tool which take .html as an input, open's up your browser with a new instance and pass multiple...
RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
WebvulScan

WebvulScan – Web Application Vulnerability Scanner

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or...
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...
Killshot

Killshot : Information gathering Tool

KillShot is a Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner. You Can use this tool to Spider your website and get important...