Monday, June 21, 2021
Home Tags Graph Theory

Tag: Graph Theory

Must Need

KawaiiDeauther : Jam All WiFi Clients/Routers

KawaiiDeauther : Jam All WiFi Clients/Routers

KawaiiDeauther is a pentest toolkit whose goal is to perform jam on WiFi clients/routers and spam many fake AP for testing purposes....
Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in the post...

Web Scraping: Top 4 ways to use in business

Web Scraping is like an engine of power, incredibly powerful. Whether a startup idea just grows on your mind or you are...
Cuteit

Cuteit – IP Obfuscator Made to Make a Malicious IP a...

Cuteit IP obfuscator made to make a malicious ip a bit cuter. A simple python tool to help...
RepoPeek : A Python Script To Get Details About A Repository Without Cloning

RepoPeek : A Python Script To Get Details About A Repository...

RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using the GitHub...
Intrigue Core : Discover Your Attack Surface

Intrigue Core : Discover Your Attack Surface

Intrigue Core is a framework for external attack surface discovery and automated OSINT. There are a number of use cases:
DVIA

DVIA – Damn Vulnerable iOS Application

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...