Monday, September 21, 2020
Home Tags Detection

Tag: detection

Must Need

OSIF : Open Source Information Facebook

OSIF : Open Source Information Facebook

OSIF is an accurate Facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of...
Termshark : A Terminal UI For Tshark

Termshark : A Terminal UI For Tshark

Termshark is a terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a...
Attack Range  : Tool To Simulate Attacks Against & Collect Data Into Splunk

Attack Range : Tool To Simulate Attacks Against & Collect...

Attack Range is a tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against...
WhatWeb : Next Generation Web Scanner

WhatWeb : Next Generation Web Scanner

WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems...
Arcane : A Simple Script Designed To Backdoor iOS Packages

Arcane : A Simple Script Designed To Backdoor iOS Packages

Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories. It was created...

SiteDorks : A Search Term With Different Websites

SiteDorks is a tool used to search Google, Bing, Yahoo or Yandex for a search term with different websites. A default list...
Evil-Winrm : The Ultimate WinRM Shell For Hacking/Pentesting

Evil-Winrm : The Ultimate WinRM Shell For Hacking/Pentesting

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP...