Wednesday, January 16, 2019
Home Tags Infogathering

Tag: infogathering

Must Need

Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
Social Mapper

Social Mapper – A Social Media Enumeration & Correlation Tool

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
SSH Auditor

SSH Auditor – Scan For Weak SSH Passwords On Your Network

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check all known hosts as...
XSStrike

XSStrike – Most Advanced XSS Detection Suite

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an...
Blackowl

Blackowl – Tool To Gather Information, Based On Operative-Framework

Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests ...
AWS Key Disabler

AWS Key Disabler – Lambda Script That Will Disable Access Keys...

The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to...