Tuesday, January 28, 2020
Home Tags John the ripper

Tag: john the ripper

Must Need

GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
EKFiddle

EKFiddle – A framework Based On The Fiddler Web Debugger To...

EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general. Enable C# scripting (Windows only) Launch...
hassh

Hassh : Tool Used To Identify Specific Client & Server SSH...

HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored,...
NebulousAD : Automated Credential Auditing Tool

NebulousAD : Automated Credential Auditing Tool

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a...
RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
HABU

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
Gpredict

Gpredict – Satellite Tracking Application

Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation algorithms together with NORAD two-line element...