Subterfuge , a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstr...
![[Subterfuge v1.0] Automated Man-in-the-Middle Attack Framework](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg54tpWvfnolhGWBoz_WPwoTbk9QICWVSz1tK1-u3vKARVFzux7qtNNDNso3ge19rHx3mwoDEoBTajUvqxwal8GK_J3QxwJmHAJrvWT261kttiaGzJef3u2l-lcYPmPl-SkJB0oehEz9w8/s72-c/SubterfugeWallpaper.png) 
![[Subterfuge v1.0] Automated Man-in-the-Middle Attack Framework](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg54tpWvfnolhGWBoz_WPwoTbk9QICWVSz1tK1-u3vKARVFzux7qtNNDNso3ge19rHx3mwoDEoBTajUvqxwal8GK_J3QxwJmHAJrvWT261kttiaGzJef3u2l-lcYPmPl-SkJB0oehEz9w8/s72-c/SubterfugeWallpaper.png) 
Subterfuge , a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstr...
![[fwknop] Single Packet Authorization and Port Knocking](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoJqCxRI57n0Cwz57n52DfXQCD7_qKPf0gvoGxYDGj3gXE5UqXSdbEHp8SZXkYEfbObbBVCLLafdT03310cGKiS13sC9HtGZPiT_RJ9mTQmN4-8ki7npPpl2T_xlmLfGwZgRixu7Y1vjg/s72-c/fwknop_tutorial_network_diagram.png) 
fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA) ...
![[Social Password Decryptor v4.0] All-in-one Social Network Password Recovery Software](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhogql5xyg5LeYe_etv5GliQ6Udm5gOx3LmrgN4GF4IDAAEKq9qeP5ng_2G_GdTY_8GsOO6avf-uu-kJpjC0b6vMXiP2fRBvvwaduzQ_6tP2vLqvjYfQnkSlc7YKG7KoilWjYpZ_f_pRw/s72-c/social_password_decryptor.jpg) 
Social Password Decryptor is the FREE software to instantly recover Passwords for popular Social Networks such as Facebook, Twitter, Goog...
![[Fing] Tool for Network Scan and Analysis for iPhone](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj92vsnuqgsRpwryNHnubDJp4nUFs04pKuF7cu20T6-9RGGhym80CXJy6oRb6mv4f_94acJFdr81xnT_lVPi138C0RFsZsvVbPx9an-ybOh1RPwmEWZKVC-clW3FCN_PjN2A30T-0XhfAc/s72-c/fing.jpeg) 
Highlight of features: + Discovers all devices connected to a Wi-Fi network. No limitation! + Displays the MAC Address and up-to-date Vend...
![[CIAT] Crypto Implementations Analysis Toolkit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQG7yYq9bVVeJzfuK0lP5Spffk4_vte3xAf4sIJOvv62WacLaR81oNPM1UGicn7ospld3Ysd2uXf4_jXAPTP-If7TGoS2_fjDHLy76N-t8o9Bcv1fWhmL236dJzWodYvq3REKl2DWmxoI/s72-c/Crypto+Implementation+Analysis+Toolkit+(CIAT).png) 
The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the de...
 
srm (secure rm) is a command-line compatible rm(1) which overwrites file contents before unlinking. The goal is to provide drop in security...
![[Weevely v1.1] Stealth tiny PHP web shell](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigGxPe7hyphenhyphenJD3pDAWSktwur-w9QDIszG3uvii64u7Wu7doX1FxU-OHcVu4Sx_QDXWce4ak2c5PiN8CxAJD2e_XWm86vG_X_29hroaUAPCvkmnEk5e7N7-QTIexizHatxk14MpvpDaf_SuI/s72-c/Weevely.png) 
Weevely is a stealth PHP web shell that provides a telnet-like console. It is an essential tool for web application post exploitation , an...
![[The Sleuth Kit] Library and collection of command line tools to investigate disk images](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ8gU97EuPcf-DvtDCTFM7vAjI1AWwr7O1ccAAlx6oqwT6pwt4FMJc4eA8uoHXY6HNvm4E58ULaSApwlL5m7mtinrcvAUmQa88ALeHLo0BLOYUGtP4LfOfQtEkL9Bb2KwbcWJOTSK6d28/s72-c/Sleuthkit.gif) 
The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view al...
 
Just updated DNSRecon to check if it can pull the Bind Version by doing a query for the TXT Record version.bind and it will now check if t...