Wednesday, July 8, 2020
Home Tags Eaphammer

Tag: Eaphammer

Must Need

Gophish : Open-Source Phishing Toolkit

Gophish : Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily...
Cloudmapper

Cloudmapper – Tool Helps To Analyze Your AWS Environments

CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser....
Scout2

Scout2 – Security Auditing Tool For AWS Environments

Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual...
Spykeyboard

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

Spykeyboard is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated...
Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
Flashmingo

Flashmingo : Automatic Analysis of SWF Files Based On Some Heuristics

FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing...
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...