OpenSnitch – GNU/Linux port of the Little Snitch application firewall

OpenSnitch is a GNU/Linux port of the Little Snitch application firewall. OpenSnitch是Little Snitch应用防火墙的GNU / Linux端口。 Requirements 要求 You'll need a GNU/Linux distribution with iptables, NFQUEUE and ftrace kernel support. 你需要一个GNU / Linux发行版iptables,NFQUEUE和ftrace内核支持。 Install 安装 sudo apt-get install build-essential python3-dev python3-setuptools libnetfilter-queue-dev python3-pyqt5 python3-gi python3-dbus...

CATPHISH – For Phishing And Corporate Espionage

Project for phishing and corporate espionage. Current Algorithms SingularOrPluralise prependOrAppend doubleExtensions mirrorization homoglyphs dashOmission Punycode CATPHISH v.0.0.5 Added more languages. Improved generator code. CATPHISH v.0.0.4 Added Punycode algorithm for vietnamese and cyrillic characters map. ruby catphish.rb -d...

SigPloit – Telecom Signaling Exploitation Framework – SS7, GTP, Diameter & SIP

SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being...

AVET – AntiVirus Evasion Tool

AVET is an AntiVirus Evasion Tool, which was developed for making life easier for pentesters and for experimenting with antivirus evasion techniques. In version 1.1 lot of stuff was introduced, for...

RED HAWK – All In One Tool For Information Gathering, SQL Vulnerability Scannig and...

RED HAWK is An All In One Tool For Information Gathering, SQL Vulnerability Scannig and Crawling. Coded In PHP. Features Of The Tool: Server detection Cloudflare detector robots scanner CMS Detector WordPress ...
video

Weaponize a Mouse with WHID Injector for Fun & W00t

Researcher Luca Bongiorni has detailed the procedure to weaponize a new mouse with WHID Injector to show you how to create malicious HID devices.   研究员Luca Bongiorni详细说明了使用WHID Injector武器化新鼠标的过程,向您展示如何创建恶意HID设备 Hello there! Finally, I had some...

Hashcat v3.6.0 – fastest and most advanced password recovery tool

hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware...

Belati – The Traditional Swiss Army Knife for OSINT

Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose. This tools is inspired by Foca and Datasploit for OSINT. What Belati can do? ...

hackerbot -Chat with your assistant and enjoy hacking

This bot is a combination of chatbot and hacking tools 和你的黑客机器人聊天 This bot is a combination of chatbot and hacking tools 这个机器人是chatbot和黑客工具的组合 Chatting Twitter account analysis Url scan File scan Ip scan Linux enumeration ...

pymultitor – Python Multi Threaded Tor Proxy

Did you ever want to be at two different places at the same time? While performing penetration tests there are often problems caused by security devices that block the "attacking" IP. With a...
- Advertisement -

APLICATIONS

Exploit Database -The official Exploit Database Repository

The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim...

HOT NEWS