Thursday, May 28, 2020
Home Tags Phishing

Tag: Phishing

Must Need

Headless Burp

Headless Burp – Automate security tests using Burp Suite

Headless Burp provides an extension to Burp that allows you to run Burp Suite's Spider and Scanner tools in headless mode via command-line. However, it...
DNSDmpstr

DNSDmpstr : Unofficial API & Client for DnsDumpster & HackerTarget

DNSDmpstr is an unofficial API & Client for DNS Dumpster and HackerTarget.com IP tools. DNS dumpster is a FREE...
Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit Of Juice

Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit...

Juicy Potato is a sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
Knock

Knock – Tool Designed To Enumerate Subdomains

Knock is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is...
Droid Hunter

Droid Hunter – Android Application Vulnerability Tool

Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java...