Friday, April 3, 2020
Home Tags Raptor

Tag: Raptor

Must Need

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail +...

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases uploaded on...
Why should you build your next app with Flutter?

Why should you build your next app with Flutter?

If you want to stay up to date, you will need to develop an app for your product or service. And...
NETATTACK

NETATTACK – Scan And Attack Wireless Networks

The  NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability...
Theo : Ethereum Recon And Exploitation Tool

Theo : Ethereum Recon And Exploitation Tool

Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features
Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses. UAC-A-mola has...
MultiJuicer : Run Capture Flags & Security Trainings With OWASP Juice Shop

MultiJuicer : Run Capture Flags & Security Trainings With OWASP Juice...

MultiJuicer is a tool used to run capture the flags and security trainings with OWASP juice shop . Running CTFs and Security...
CredSniper

CredSniper – Phishing Framework Written Python and Jinja2

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure access...