Wednesday, October 16, 2019
Home Tags Horn3t

Tag: Horn3t

Must Need

Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
LdapDomainDump : Active Directory Information Dumper via LDAP

LdapDomainDump : Active Directory Information Dumper via LDAP

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved...
EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail +...

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases uploaded on...
Slurp : Evaluate The Security Of S3 Buckets

Slurp : Evaluate The Security Of S3 Buckets

Slurp is a Blackbox/whitebox S3 bucket enumerator. Overview Credit to all the vendor packages...
Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based...
QRLJacking

QRLJacking : A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that...