Thursday, June 17, 2021
Home Tags Malicious Apps

Tag: Malicious Apps

Must Need

Kics : Find Security Vulnerabilities & Compliance Issues

Kics : Find Security Vulnerabilities & Compliance Issues

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
Polypyus : Locate Functions In Raw Binaries By Extracting Known Functions

Polypyus : Locate Functions In Raw Binaries By Extracting Known Functions

Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus...
Python RAT

Stitch A Cross Platform Python Remote Administration Tool

This is a cross-platform python framework that permits you to create custom payloads for Windows, Mac OSX, and UNIX moreover. you're ready to choose...
ADCollector : Tool To Quickly Extract Valuable Information From Active Directory

ADCollector : Tool To Quickly Extract Valuable Information From Active Directory

ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic...
EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail +...

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases uploaded on...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
Sherloq : An Open-Source Digital Image Forensic Toolset

Sherloq : An Open-Source Digital Image Forensic Toolset

Sherloq is a personal research project about implementing a fully integrated environment for digital image forensics. It is not meant as an...