Phishing Campaign Toolkit Installation For instructions on how to install, please see the INSTALL.md file. After installing, for instructions on how to...
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration...
It can be quite annoying when you have limited access to ports on a network and causes problems when pentesting, as you...
Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
SEToolkit – Hacking Windows Machines Infectious Media Generator Requirements Linux based Operating System (In this tutorial we are using Kali Linux) SEToolkit...
How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux It can be quite annoying when you have limited access to ports...
PRET is a new tool for printer security testing developed in the scope of a Master’s Thesis at Ruhr University Bochum. It...
The Social-Engineer Toolkit (SET) v7.6.4 released The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed to perform advanced and quick...
Portable network toolkit TCP Monitor Plus has had its first update since 2015, adding a snapshot feature and some handy display tweaks....
Security researcher and software engineer Alec Muffett has created a new project called the Enterprise Onion Toolkit (EOTK), which can help website...
The Metasploit hacking toolkit now includes a new hardware bridge that makes it easier for users to analyze hardware devices. The popular...
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the...
A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it...
This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results...
Brutal is a simple toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device....
Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK )...
Short Bytes: Microsoft used the CNTK toolkit to create a system which can understand words in a conversation just like humans. In...
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. It features an easy to...
Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed...
A tool that transforms Firefox Browsers into a penetration testing suite How ? It downloads the most important extensions, and install it...
bt2 is a Python-based backdoor in form of a IM bot that uses the infrastructure and the feature-rich bot API provided by...