Thursday, February 27, 2020
Home Tags Open-Sourced

Tag: Open-Sourced

Must Need

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
Modlishka

Modlishka : A Flexible And Powerful Reverse Proxy Tool

Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased...

Burp Suite Extension – Turbo Intruder To Perform Security Testing on...

Turbo Intruder is a Burp Suite extension which is an integrated platform for performing security testing of web applications. It sends many...
Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy for Bot...
Horn3t : Powerful Visual Subdomain Enumeration at the Click of a Mouse

Horn3t : Powerful Visual Subdomain Enumeration at the Click of a...

Horn3t is your number one tool for exploring subdomains visually. Tested on Windows 10 and Debian with Google Chrome/Chromium 73.
VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create...
Recsech – Tool For Doing Footprinting & Reconnaissance On The Target Web

Recsech – Tool For Doing Footprinting & Reconnaissance On The Target...

Recsech is a tool for doing  Footprinting and Reconnaissance on the target web. It collects information such as DNS Information, Sub Domains, HoneySpot...