Sunday, September 22, 2019
Home Tags Phishing Simulation

Tag: Phishing Simulation

Must Need

MalwareCMDMonitor

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On...

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In a nutshell, it downloads...
Sherlock : Find Usernames Across Social Networks

Sherlock : Find Usernames Across Social Networks

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python 3.6 or...
RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
Flightsim

Flightsim : Utility to Generate Malicious Network Traffic & Evaluate Controls

Flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.
EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application...
PacBot : Platform For Continuous Compliance & Security Automation For The Cloud

PacBot : Platform For Continuous Compliance & Security Automation For The...

PacBot is a platform for continuous compliance monitoring, compliance reporting and security automation for the cloud. In PacBot, security and compliance...
Project iKy – Tool To Collects Information From An Email

Project iKy – Tool To Collects Information From An Email

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout