Saturday, January 23, 2021
Home Tags Phishing

Tag: Phishing

Must Need

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based...
BPYTOP : Linux/OSX/FreeBSD Resource Monitor

BPYTOP : Linux/OSX/FreeBSD Resource Monitor

BPYTOP is a resource monitor that shows usage and stats for processor, memory, disks, network and processes. Features
Pwndb

Pwndb : Search For Leaked Credentials

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name.
Microctfs

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker. Microctfs Logviewer Build and Start logviewer challenge exposed on port 8000 cd logviewer docker build -t logviewer...
OFFPORT_KILLER : Tool Aims At Automating The Identification Of Potential Service Running

OFFPORT_KILLER : Tool Aims At Automating The Identification Of Potential Service...

OFFPORT_KILLER tool aims at automating the identification of potential service running behind ports identified manually or on services running locally only.
Android Application

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change...
HeapInspect : Inspect Heap In Python

HeapInspect : Inspect Heap In Python

HeapInspect is designed to make heap much more prettier. So let us have some of the feature of this tool which will...