Friday, December 13, 2019
Home Tags Firewall

Tag: firewall

Must Need

NebulousAD : Automated Credential Auditing Tool

NebulousAD : Automated Credential Auditing Tool

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a...
Re-composer : Randomly Changes Win32/64 PE Files For ‘Safer’ Uploading To Malware & Sandbox Sites

Re-composer : Randomly Changes Win32/64 PE Files For ‘Safer’ Uploading To...

Ever have that not so safe feeling uploading your malware binaries to VirusTotal or other AV sites because you can look up...
Userrecon-py : Username Recognition On Various Websites

Userrecon-py : Username Recognition On Various Websites

Userrecon-py is used for Username recognition on various websites. is used for Username recognition on various websites.
OSINT-SPY : Performs OSINT Scan On Email/Domain/IP_Address/Organisation

OSINT-SPY : Performs OSINT Scan On Email/Domain/IP_Address/Organisation

Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator...
Ducky Exploit

Ducky Exploit – Arduino Rubber Ducky Framework

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on ; Kali Linux 18.2 ...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
Hershell

Hershell – Simple TCP Reverse Shell Which Can Work On Multiple...

Hershell is a simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint...