Monday, October 14, 2019
Home Tags Phishing Engagements

Tag: Phishing Engagements

Must Need

Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...

Kamerka – Build Interactive Map Of Cameras From Shodan

Kamerka is a tool to build interactive map of cameras from Shodan. The script creates a map of cameras, printers, tweets and photos based...
Vim.Wasm

Vim Wasm – Vim Editor Ported To WebAssembly

Vim Wasm project is running Vim editor on browser by compiling Vim C sources into WebAssembly. Notices Please access from a desktop browser (Chrome/Firefox/Safari/Edge). Safari...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...
Nipe

Nipe- Script To Make Tor Network Your Default Gateway

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables to course all activity...
jailbreaking

Evasi0n Jailbreaking Tools For Apple iOS 7.x & 6.x Users

Evasi0n Jailbreaking apparatuses accessible for Apple iOS 7 clients. This jailbreak utility/tool made by Evad3rs group following 3 months of iOS 7 released. evasi0n...
CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

Welcome to CommandoVM a fully customizable, Windows-based security distribution for penetration testing and red teaming. Installation