Saturday, August 17, 2019
Home Tags Phishing

Tag: Phishing

Must Need

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.
Blind-Bash

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide...
Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...
Bashark

Bashark – Bash Pentesters & Security Researchers Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. To launch it on compromised host, simply source the bashark.sh script...
BurpSuite Extension Ruby

BurpSuite Extension Ruby : Template to speed up building a...

Due the lake of examples and implementations of BurpSuite Extension Ruby, we have decided to make it easy for all rubyists to have a...
Kwetza

Kwetza – Tool To Infect An Existing Android Application With A...

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload. Python script to inject existing Android applications...
Seeker

Seeker – Find Device Information & Geo Location with High Accuracy

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker Hosts a fake website on Apache Server...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout