Monday, July 23, 2018
Home Tags Kali

Tag: kali

bluelog

Bluelog

Must Need

Curate

Curate – A tool for fetching archived URLs

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will clone this repository and then move...
PowerUpSQL

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing,...

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...
Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords ,...
Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
Droid Hunter

Droid Hunter – Android Application Vulnerability Tool

Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java...
Gcat

Gcat – Sneaking Backdoor Use Gmail As A Command &...

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

DnsenumĀ is a tool for DNS enumeration, which is the process of locating all DNS servers andĀ DNS entries for an organization. DNS enumeration will allow us...