Saturday, April 20, 2019
Home Tags Seeker

Tag: Seeker

Must Need

Linux

Top Best Useful Commands for Kali Linux?

Linux administrators can't live by the graphical UI alone. That is the reason we've ordered helpful Linux commands into this advantageous guide. Kali Linux...

Penetration Testing Resources For Simulated Attacks

Penetration testing, all the more usually called pentesting, is the act of discovering openings that could be abused in an application, system or framework...
Instainsane

Instainsane : Multi-threaded Instagram Brute Forcer

Instainsane is an Shell Script to perform multi-threaded brute force attack against Instagram, this script can bypass login limiting and it...
CertCrunchy

CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates...

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or...
Apfell

Apfell – A MacOS, Post-Exploit, Red Teaming Framework

Apfell is a macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for...
IP-Biter

IP-Biter : The Hacker-friendly E-Mail Tracking Framework

IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed in e-mails,...
Social Mapper

Social Mapper – A Social Media Enumeration & Correlation Tool

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool...