Monday, August 20, 2018
Home Tags Protocol attacks

Tag: protocol attacks

Must Need

Evilginx

Evilginx – MITM Attack Framework For Phishing Credentials & Session Cookies

Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server,...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Aircrack-NG

Aircrack-NG : Complete Suite Tools To Assess WiFi Network Security

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and...
Whatsapp_Automation

Whatsapp_Automation : Collection Of APIs Interact With WhatsApp Running In An...

Whatsapp_Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending...
Win-PortFwd

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native...

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .win-portfwd.ps1 Also Read MacSubstrate –...

Johnny

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing is not disabled, two...
OWASP Joomla Vulnerability Scanner

Joomscan – OWASP Joomla Vulnerability Scanner Project

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability...