Thursday, October 17, 2019
Home Tags Hash

Tag: hash

Must Need

Shellsum : A Defense Tool – Detect Web Shells In Local Directories Via MD5Sum

Shellsum : A Defense Tool – Detect Web Shells In Local...

Shellsum is a defense tool to detect web shells in local directories via md5sum. Following are some of the features of this...
Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence Items

Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence...

Kirjuri is a simple php/mysql web application for managing physical forensic evidence items. It is intended to be used as a workflow...
AndroL4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware...

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various...
Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
RPI Hunter

RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry

rpi hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...
WindowsSpyBlocker

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach...
Winspy

Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP...

WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisene. Dependencies metasploit-framework xterm apache2 Also ReadEvilginx2 – Standalone MITM Attack Framework Used For...