Friday, December 6, 2019
Home Tags Pentesting

Tag: pentesting

bluelog

Bluelog

Must Need

Apfell

Apfell – A MacOS, Post-Exploit, Red Teaming Framework

Apfell is a macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for...
Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based...
Facebash : Facebook Brute Forcer In Shellscript Using TOR

Facebash : Facebook Brute Forcer In Shellscript Using TOR

Facebash is a tool for facebook Brute Forcer in shellscript using TOR. Warning : Facebook blocks account for 1...
GhostDelivery : .VBS Script To Deliver Payload With Persistence

GhostDelivery : .VBS Script To Deliver Payload With Persistence

GhostDelivery is a python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions....
Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File...

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image. It is a...
Slackor : A Golang Implant That Uses Slack As A Command & Control Server

Slackor : A Golang Implant That Uses Slack As A Command...

Slackor is a golang implant that uses Slack as a command and control server. This tool is released as a proof...
Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator is a obfuscate python scripts making them password-protected using AES Encryption. Usage Just execute...