Tuesday, May 26, 2020
Home Tags Lockphish

Tag: Lockphish

Must Need

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions.
TakeOver : Sub-Domain TakeOver Vulnerability Scanner

TakeOver : Sub-Domain TakeOver Vulnerability Scanner

Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...
Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in...
OSINT-SPY : Performs OSINT Scan On Email/Domain/IP_Address/Organisation

OSINT-SPY : Performs OSINT Scan On Email/Domain/IP_Address/Organisation

Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator...
InstaSave : Python Script To Download Images, Videos & Profile Pictures From Instagram

InstaSave : Python Script To Download Images, Videos & Profile Pictures...

InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.
IPRotate : Extension For Burp Suite Which Uses AWS API Gateway To Rotate Your IP On Every Request

IPRotate : Extension For Burp Suite Which Uses AWS API Gateway...

IPRotate is a tool used for Burp Suite which uses AWS API Gateway to change your IP on every request. This extension...
Kube-Hunter

Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes...