Thursday, June 27, 2019
Home Tags Intel Techniques

Tag: Intel Techniques

Must Need

DOGE

DOGE : Darknet Osint Graph Explorer

DOGE is a darknet Osint Graph Explorer, which is still in the development stage and you should use this in addtion to...
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot is a service to mask your e-mails. It was inspired by Blur, where you can create an alias for your...
Invisi-Shell

Invisi-Shell : Hide Your Powershell Script In Plain Sight(Bypass all Powershell...

Invisi-Shell is a tool used to hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging,...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious...

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence sources can...
Autovpn

Autovpn – Connect to a VPN in a Country of your...

AutoVpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0 was released. It was...