A Tool developed for searching malwares at openmalware.org by command line, allowing specific malware to be downloaded via shell. The tool was...
Beelogger allows you to generate a keylogger in a document format which can be executed via emails Features Send logs each 120...
With the dynamics of persuasion that prove effective in a pentest, several painstaking means of making a payload has emerged, Insanity Framework...
RansomFree is a new tool that promises to stop ransomware attacks before they can get busy encrypting all of your data. Instead...
Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.py or python2.7 rePy2exe.py Authors Alisson...
A tool to kick devices off of your network and enjoy all the bandwidth for yourself. It allows you to select specific...
This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well....
Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa...
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the...
SSMA is a simple malware analyzer written in Python 3. Features: Searches for websites, e-mail addresses, IP addresses in the strings of...
Serpico is a penetration testing report generation and collaboration tool. It was developed to cut down on the amount of time it...
LOG-MD was designed for Windows based systems to audit log and advanced audit policy settings and guide users to enable and configure...
Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK )...
Faraday introduces a new concept – IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of...
Are you sure that you can detect an APT malware? YES or NO, whichever, try ShinoBOT; this is a BOT or RAT...
Keylogging is the malicious action of spying on the keyboard input of a target user. This is done in secret by malware...
Heathen Internet of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in...
Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter...
A stealthy Python based backdoor that uses Gmail as a command and control server. Requirements A Gmail account (Use a dedicated account!...
Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system and let’s you obfuscate every byte via encoders. Install/Uninstall If...
SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target....