Home Authors Posts by Gabriel Sita

Gabriel Sita


Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once credentials are gained,...

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including...
king phisher

King Phisher – Phishing Campaign Toolkit

Feature Overview Fully open source means there’s no limits on useRun multiple phishing campaigns simultaneouslyView detailed graphs regarding the campaign resultsSend email with embedded...

trape – Track People on the Web

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching...
NanoCore RAT download

Download NanoCore RAT FULL

Features Complete Stealth Remote ControlRecover Passwords from the Victim DeviceManage NetworksManage FilesSurvellancePlugins (To take it to the next level)Many advanced features like SCRIPTING
Fitness trackers

4 Things You Didn’t Know About Fitness Trackers and Security

Smartwatches, trackers and fitness trackers can expose networks if they are not properly connected and managed. What and how much security risk activity trackers pose to IT? Well, more than you might think. Hackers target...

cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
Tor Browser for Android

Tor Browser for Android

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online. Features BLOCK TRACKERS Tor Browser isolates each website you visit...

The Four Most Serious Threats Facing Online Businesses In 2018

Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and cryptojacking. Businesses can’t afford to ignore online crime. The average cost of...

You Can’t Stop All Malware, But You Can Stop The Damage

Organizations cannot stop all malware with today’s endpoint security technologies, but they can mitigate the damage that malware intends to cause. To do so, they will need to implement a defense-in-depth strategy with an...

More Articles