Ghost Phisher is an application of security which comes built-in with a fake DNS server , DHCP server fake, fake HTTP Server a...
![[Ghost Phisher v1.5] GUI suite for phishing and penetration attacks](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyhzipgxqwC9MMVgPOZWvYT8mV22shG8-PGYudowx11QdmB4ETqo-LJlCq1E6LFayH2ZyXL8FVphuLXavo-pA4SoLWcu0cWUxxiXkLO70PoumgHpydoU3fx-nmFu3db_JYTav5lCcf3JA/s72-c/ghost_phisher.png)
Ghost Phisher is an application of security which comes built-in with a fake DNS server , DHCP server fake, fake HTTP Server a...
Kacak is a tool that can enumerate users specified in the configuration file for windows based networks. It uses metasploit smb_enumusers_d...
Un repositorio de mas de 200 herramientas relacionadas con todas las áreas de seguridad informática, actualizadas hasta la ultima versión di...
Lynis is a security tool to audit and harden Unix and Linux based systems. It scans the system by performing many security control checks, ...
An automated XSS payload generator written in python. Usage Record request(s) with Burp proxy Select request(s) you want to generate, then ...
GDB, the GNU Project debugger, allows you to see what is going on `inside' another program while it executes - or what another program w...
Capstone is a lightweight multi-platform, multi-architecture disassembly framework. Our target is to make Capstone the ultimate disassembly...
A small perl script that checks a target server whether it is prone to BEAST vulnerability via target preferred cipher. It assumes no work...
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, i...