Thursday, April 2, 2020
Home Tags Kali

Tag: kali

Must Need

DDoor : Cross Platform Backdoor Using DNS txt Records

DDoor : Cross Platform Backdoor Using DNS txt Records

DDoor is a cross platform backdoor using dns txt records. It is a cross platform light weight backdoor that uses txt records...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop shop for all of...
HABU

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
XSHOCK : Tool To Exploits ShellShock

XSHOCK : Tool To Exploits ShellShock

XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.
Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To...

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported...
BruteX

BruteX – Automatically Brute Force All Services Running On A Target

BruteX is a tool to automatically brute force all services running on a target. As you all know...
Pyrit

Pyrit : The Famous WPA Pre-Computed Cracker, Migrated from Google

Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the...