Tuesday, June 15, 2021
Home Tags Liffy

Tag: Liffy

Must Need

Reverie

Reverie – Automated Pentest Tools Designed For Parrot Linux

Reverie is an automated Pentest Tools Designed For Parrot Linux. This tool will make your basic pentesting task like...
InQL – A Burp Extension for GraphQL Security Testing

InQL – A Burp Extension for GraphQL Security Testing

A security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script, or as a...
Seeker

Seeker – Find Device Information & Geo Location with High Accuracy

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker Hosts a fake website on Apache Server...
Win-PortFwd

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native...

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .win-portfwd.ps1 Also Read MacSubstrate –...
BlackDir Framework : Web Application Vulnerability Scanner

BlackDir Framework : Web Application Vulnerability Scanner

BlackDir Framework is a Web Application Vulnerability Scanner with the following features; Spider DirectoriesFind Sub DomainAdvanced Dorks SearchScan list...
Seth : Perform A MitM Attack & Extract Clear Text Credentials From RDP Connections

Seth : Perform A MitM Attack & Extract Clear Text Credentials...

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to...
Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope...