Wednesday, January 29, 2020
Home Tags Phishing

Tag: Phishing

Must Need

Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...

Secret Keeper : Python Script To Encrypt & Decrypt Files With...

Secret Keeper is a file encryptor written in python which encrypt your files using Advanced Encryption Standard (AES). CBC Mode is used when creating...
Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
IP Finder CLI : The Official Command Line Client For IPFinder

IP Finder CLI : The Official Command Line Client For IPFinder

IP Finder CLI is the Official Command Line Client For IPFinder, singing up for a free account at https://ipfinder.io/auth/signup, for Free IPFinder API...
Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To...

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported...
0xsp Mongoose : Linux Privilege Escalation Intelligent Enumeration Toolkit

0xsp Mongoose : Linux Privilege Escalation Intelligent Enumeration Toolkit

Using 0xsp Mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
Crashcast

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps &...

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast device(s) obtained from Shodan.io.