Wednesday, July 28, 2021
Home Tags Two-Step Authentication

Tag: Two-Step Authentication

Must Need

Penta : Open Source All-In-One CLI Tool To Automate Pentesting

Penta : Open Source All-In-One CLI Tool To Automate Pentesting

Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info...
HUNT

HUNT – Burp Suite Pro/Free and OWASP ZAP Extensions

HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability classes (Burp Suite Pro...
MurMurHash : Tool To Calculate A MurmurHash Value Of A Favicon To Hunt Phishing Websites On The Shodan Platform

MurMurHash : Tool To Calculate A MurmurHash Value Of A Favicon...

MurMurHash is a tool used to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Girsh : Automatically Spawn A Reverse Shell Fully Interactive

Girsh : Automatically Spawn A Reverse Shell Fully Interactive

With Girsh, just run it and it will detect the OS and execute the correct commands to upgrade it to a full...
BaphoDashBoard : Dashboard For Manage & Generate The Baphomet Ransomware

BaphoDashBoard : Dashboard For Manage & Generate The Baphomet Ransomware

With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard is developed...
EvilOSX

EvilOSX – An Evil Remote Administration Tool For MacOS / OS...

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module...