Tuesday, July 16, 2019
Home Tags Fake ap

Tag: fake ap

Must Need

Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
CredSniper

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...
GoldenEye

GoldenEye – GoldenEye Layer 7 DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY. GoldenEye is a HTTP DoS Test Tool. Attack Vector exploited: HTTP Keep Alive +...
4nonimizer

4nonimizer – A Bash Script For Anonymizing The Public IP Used...

4nonimizer is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs...
Windows 95

Windows 95 : Windows 95 in Electron That Runs on macOS,...

This is Windows 95, running in an Electron app, which runs on macOS, Linux, and Windows. Bear in mind that this is...
Got-Responded

Got-Responded : Tool to Detect NBT-NS & LLMNR Spoofing

Got-Responded is a simple tool to detect NBT-NS and LLMNR spoofing and messing with them a bit. Pentesters, Redteamers and even...
Seth : Perform A MitM Attack & Extract Clear Text Credentials From RDP Connections

Seth : Perform A MitM Attack & Extract Clear Text Credentials...

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout