Monday, February 18, 2019
Home Tags Linux

Tag: linux

Must Need

phishing

ReelPhish – A Real-Time Two-Factor Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the...
SSRFmap

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes...
Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...
WiFiJammer

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards...
Joomscan

Joomscan – OWASP Joomla Vulnerability Scanner Project

OWASP JoomScan is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them. If you want to do a...
Social Mapper

Social Mapper – A Social Media Enumeration & Correlation Tool

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...