Monday, February 18, 2019
Home Tags Ebooks

Tag: Ebooks

Must Need

Metateta

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are...
Evilginx2

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials...

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...
Kemon

Kemon – An Open-Source Pre & Post Callback-Based Framework For macOS...

Kemon is an open-source Pre and Post callback-based framework for macOS kernel monitoring. With the power of it, we can easily implement LPC communication...
SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...
HawkEye

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password...
EKFiddle

EKFiddle – A framework Based On The Fiddler Web Debugger To...

EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general. Enable C# scripting (Windows only) Launch...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...