cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
Tor Browser for Android

Tor Browser for Android

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online. Features BLOCK TRACKERS Tor Browser isolates each website you visit...
DFIRTrack

DFIRTrack – The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend. Installation and dependencies
DCOMrade

DCOMrade – Powershell Script for Enumerating Vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work...
trape

trape – Track People on the Web

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching...

Modlishka – Flexible and Powerful Reverse Proxy

Features Some of the most important ‘Modlishka’ features : Support for majority of 2FA authentication schemes (by...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including...
Scavenger

Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once credentials are gained,...
Tyton

Tyton – Kernel-Mode Rootkit Hunter

Loadable kernel modules, LKMs for short, are an integral companion to the Linux kernel. Typically, LKMs are used to add support for new hardware (as device drivers) or file systems or add...
king phisher

King Phisher – Phishing Campaign Toolkit

Feature Overview Fully open source means there’s no limits on useRun multiple phishing campaigns simultaneouslyView detailed graphs regarding the campaign resultsSend email with embedded...
211FansLike
0FollowersFollow
2,582FollowersFollow

More Articles