Wednesday, September 18, 2019
Home Tags MITM


Must Need


CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates...

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently,, and or...

Log-killer : Clear All Your Logs In Linux & Windows Servers

Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your server OS...
0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network, the program also allows you to perform...

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most ...

GodOfWar : Malicious Java WAR Builder With Built-In Payloads

GodOfWar is a command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby.
Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...

Shopping cart

Shipping and discount codes are added at checkout.