Saturday, May 30, 2020
Home Tags Scan

Tag: scan

Must Need

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools...

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot...
Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
Seeker : Accurately Locate Smartphones Using Social Engineering

Seeker : Accurately Locate Smartphones Using Social Engineering

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that...
DSSS – Damn Small SQLi Scanner

DSSS – Damn Small SQLi Scanner

DSSS (Damn Small SQLi Scanner) is a fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of...
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
Crashcast

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps &...

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast device(s) obtained from Shodan.io.

Triton – Dynamic Binary Analysis (DBA) Framework

Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations...