Thursday, October 17, 2019
Home Tags Malware

Tag: Malware

Must Need

Anti-Phishing Tools

Cloud-Based Anti-Phishing Tools Can Help Prevent Phishing Attempts By Cybercriminals

Phishing has, is, and will always remain a threat. The most advanced cloud-based anti-phishing tools are there to help you not only...
HostHunter

HostHunter : To Discover Hostnames Using OSINT

HostHunter is a recon tool for discovering hostnames using OSINT techniques. HostHunter v1.5 is a tool to efficiently discover...
WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot is a WiFi-Penetest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack). It is built to provide...
Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
VSHG

VSHG : A Standalone Addon for GnuPG

VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetric encryption...
ImaginaryC2

ImaginaryC2:Python Tool Help In Network Behavioral Analysis Of Malware

ImaginaryC2 is a python tool which aims to help in the behavioral (network) analysis of malware. It hosts a HTTP server which...
Mquery : YARA Malware Query Accelerator

Mquery : YARA Malware Query Accelerator

Mquery can be used to search through terabytes of malware in a blink of an eye: