cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
Tor Browser for Android

Tor Browser for Android

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online. Features BLOCK TRACKERS Tor Browser isolates each website you visit...
DFIRTrack

DFIRTrack – The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend. Installation and dependencies
Ghidra

Download Ghidra – NSA Software Reverse Engineering

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze...
DCOMrade

DCOMrade – Powershell Script for Enumerating Vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including...
trape

trape – Track People on the Web

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching...
Tyton

Tyton – Kernel-Mode Rootkit Hunter

Loadable kernel modules, LKMs for short, are an integral companion to the Linux kernel. Typically, LKMs are used to add support for new hardware (as device drivers) or file systems or add...
Scavenger

Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once credentials are gained,...

Modlishka – Flexible and Powerful Reverse Proxy

Features Some of the most important ‘Modlishka’ features : Support for majority of 2FA authentication schemes (by...
209FansLike
0FollowersFollow
2,559FollowersFollow

More Articles