Friday, August 23, 2019
Home Tags Exploitation

Tag: exploitation

Must Need

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator : Obfuscate A Python Code 2.x & 3.x

Intensio Obfuscator is an obfuscate a python code 2.x and 3.x. Takes a python source code and transform it into an obfuscated...
SwiftMonkey : A Framework For Doing Randomised UI Testing Of iOS Apps

SwiftMonkey : A Framework For Doing Randomised UI Testing Of iOS...

SwiftMonkey project is a framework for generating randomised user input in iOS apps. This kind of monkey testing is useful for stress-testing...
Autocrack

Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

Autocrack is python script is a Hashcat wrapper to help automate the cracking process. The script includes multiple functions to select a set of...
Sandsifter

Sandsifter – The x86 Processor Fuzzer For Hidden Instructions & Hardware...

The sandsifter audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a processor's instruction set, and...
Winspy

Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP...

WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisene. Dependencies metasploit-framework xterm apache2 Also ReadEvilginx2 – Standalone MITM Attack Framework Used For...
CuckooDroid

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox

CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of...
Arjun

Arjun : HTTP Parameter Discovery Suite

Also Read - PFQ : Functional Network Framework for Multi-Core Architectures Usage

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout