Wednesday, August 5, 2020
Home Tags Unix

Tag: unix

Must Need

PhoneSploit : Using Open ADB Ports We Can Exploit A Android Device

PhoneSploit : Using Open ADB Ports We Can Exploit A Android...

PhoneSploit is using open Adb ports we can exploit a Android Device. You can find open ports by clicking here.
Cuteit

Cuteit – IP Obfuscator Made to Make a Malicious IP a...

Cuteit IP obfuscator made to make a malicious ip a bit cuter. A simple python tool to help...
IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules...
Pown : A Security Testing An Exploitation Toolkit Built

Pown : A Security Testing An Exploitation Toolkit Built

Pown (Pown.js) is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like...

Burp Extensions – Burp Suite Extensions For The New Burp Suite...

Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add...
JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON Web Tokens

JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON...

JWT Tool(jwt_tool.py) is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the...
Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your...