Thursday, October 17, 2019
Home Tags Social Engineering

Tag: Social Engineering

Must Need

bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10...
WAES : Web Auto Enum & Scanner

WAES : Web Auto Enum & Scanner

WAES is nothing but Web Auto Enum & Scanner. Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial....
Sherlock : Find Usernames Across Social Networks

Sherlock : Find Usernames Across Social Networks

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python 3.6 or...
HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

HiddenWall : Linux Kernel Module Generator For Custom Rules With Netfilter

HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on...
Osmedeus

Osmedeus : Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability...

Osmedeus allow you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. If you have...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...