Monday, June 1, 2020
Home Tags Wrapper

Tag: Wrapper

Must Need

4nonimizer

4nonimizer – A Bash Script For Anonymizing The Public IP Used...

4nonimizer is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs...
Legion

Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration...

Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

DnsenumĀ is a tool for DNS enumeration, which is the process of locating all DNS servers andĀ DNS entries for an organization. DNS enumeration will allow us...
Memhunter : Live Hunting Of Code Injection Techniques

Memhunter : Live Hunting Of Code Injection Techniques

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and ...
Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence Items

Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence...

Kirjuri is a simple php/mysql web application for managing physical forensic evidence items. It is intended to be used as a workflow...
Invoker : Penetration Testing Utility

Invoker : Penetration Testing Utility

Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through...
Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust is a tool to evaluate OSINT signals for a domain. You're part of a review board that's responsible for evaluating new...