Wednesday, October 21, 2020
Home Tags Phishing Attack

Tag: Phishing Attack

Must Need

Dejavu

Dejavu – Open Source Deception Framework

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...
Legion

Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration...

Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids...
Diaphora : Most Advanced Free & Open Source Program Diffing Tool

Diaphora : Most Advanced Free & Open Source Program Diffing Tool

Diaphora (διαφορά, Greek for 'difference') version 1.2.4 is a program diffing plugin for IDA, similar to Zynamics Bindiff or other FOSS...
PrivescCheck : Privilege Escalation Enumeration Script for Windows

PrivescCheck : Privilege Escalation Enumeration Script for Windows

PrivescCheck script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information which might...
C41N : An Automated Rogue Access Point Setup Tool

C41N : An Automated Rogue Access Point Setup Tool

c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, and Evil...
SKA : Simple Karma Attack

SKA : Simple Karma Attack

SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice...
shhgit : Finds Secrets & Sensitive Files Across GitHub

shhgit : Finds Secrets & Sensitive Files Across GitHub

shhgit finds secrets and sensitive files across GitHub (including Gists), GitLab and BitBucket committed in near real time. There...