Windows application for spoofing the MAC address and host name. Usage The program must be run in “administrator mode” for the functions...
A phishing app that is written in applescript. It is small and works on macs, whose users often don’t worry about malware on...
This geoip attack map visualizer was developed to display network attacks on your organization in real time. The data server follows...
The Dark Web, Deep Web or Darknet is a term that refers specifically to a collection of websites that are publicly visible,...
Keylogging is the malicious action of spying on the keyboard input of a target user. This is done in secret by malware...
Here we will learn how to create a network share via Samba using the command line interface in a easy, simple detailed...
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse...
iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The...
ir-rescue is a lightweight Windows Batch script that collects a myriad of forensic data from 32-bit and 64-bit Windows systems while respecting...
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. It features an easy to...
Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian , open source is built based on the Linux...
Anyone familiar enough with Outlook will know it has a “Rules and Alerts” section that allows the user to automate certain actions based on message...
.---. .----------- / __ / ------ / / ( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗ ////// ' / ` --- ║║╠╦╝║ ║║...
CodinGame: The new way to improve your programming skills while having fun and getting noticed. Here players can test their new ideas...
MorphAES is the world’s first polymorphic shellcode/malware engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an...
Heathen Internet of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in...
Just another manual code analysis tool and static analysis tool Codewarrior runs at HTTPd with TLS, uses KISS principle( https://en.wikipedia.org/wiki/KISS_principle ) Directories:...
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C language. DMitry has the ability to gather as...
Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter...
pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can...
A few Python programs designed to help penetration testers with email spoofing.SimpleEmailSpoofer.py A program that spoofs emails. Currently in development spoofcheck.py A...