Monday, July 13, 2020
Home Tags Network Pivoting

Tag: Network Pivoting

Must Need

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
Vault :  Tool For Secrets Management, Encryption As A Service & Privileged Access Management

Vault : Tool For Secrets Management, Encryption As A Service...

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
Hijacker

All-in-One Wi-Fi Cracking Tools for Android – Hijacker v1.5

Hijacker v1.5 is a Graphical User Interface for the penetration testing instruments Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a basic and simple UI...
Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your...
SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the...
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...