Saturday, August 17, 2019
Home Tags Phishing Tool

Tag: Phishing Tool

Must Need

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.
Headless Burp

Headless Burp – Automate security tests using Burp Suite

Headless Burp provides an extension to Burp that allows you to run Burp Suite's Spider and Scanner tools in headless mode via command-line. However, it...
Malwoverview

Malwoverview – Tool To Perform An Initial & Quick Triage On...

Malwoverview is a first response tool to perform an initial and quick triage on either a directory containing malware samples or a specific malware...
WebvulScan

WebvulScan – Web Application Vulnerability Scanner

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or...
Rogue : An Extensible Toolkit Providing Penetration Testers An Easy-To-Use Platform

Rogue : An Extensible Toolkit Providing Penetration Testers An Easy-To-Use Platform

The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for...
IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules...
Caldera : An Automated Adversary Emulation System

Caldera : An Automated Adversary Emulation System

CALDERA is an automated adversary emulation system, built on the MITRE ATT&CK™ framework. It works by attaching abilities to an adversary and running...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout