Friday, August 23, 2019
Home Tags Fake image

Tag: Fake image

Must Need

Air-Hammer

Air-Hammer – A Online Brute-Force Attack Tool

Air-Hammer is an online brute-force attack tool for use against WPA Enterprise networks. Despite the fact that WPA Enterprise is regularly viewed as "more...
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
Pentol

PENTOL – Pentester Toolkit for Fiddler2 2018

PENTOL is a pentester Toolkit is built as a plugin for the Fiddler HTTP debugging proxy. Pentol Features CORS DETECTED Cross-Origin Resource Sharing CRLF DETECTED...
CMSeeK

CMSeeK – CMS Detection And Exploitation Suite

CMSeeK is a CMS detection and exploitation suite where you can Scan WordPress, Joomla, Drupal and 100 other CMSs. CMS or content management system manages...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
NetSet :  Operational Security Utility & Automator

NetSet : Operational Security Utility & Automator

Operational Security utility and automator. NetSet is designed to automate a number of operations that will help the user with securing their network...

Kamerka – Build Interactive Map Of Cameras From Shodan

Kamerka is a tool to build interactive map of cameras from Shodan. The script creates a map of cameras, printers, tweets and photos based...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout