Tools Category

Browser Exploitation Framework (BeEF)

  BeEF is short for The Browser Exploitation Framework. it’s a testing tool designed to enable penetration testers to launch client-side attacks against target browsers. By using techniques similar to common drive-by malware, testers can assess the security of a target’s internal environment, bypassing the hardened perimeter. Growing concerns about Read more…

Loading

Secure your website

Nowadays, websites are necessary for most of the businesses and especially in e-commerce. Every attacker knows that your site holds customers data. You’ve worked hard on your site (and your brand) – so take some time to secure it. You should do the following steps to ensure your website is Read more…

Loading

Tools Category

EAPHammer

EAPHammer EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal Read more…

Loading

Tools Category

Create SSH BruteForcer in Python

Create SSH BruteForcer in Python In cryptography, a brute-force attacks consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attackers systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attackers can attempt to guess the key Read more…

Loading

Tools Category

Xerosploit

Efficient And Advanced Man In The Middle Framework Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Read more…

Loading

Tools Category

SSLsplit

Tool For Man-In-The-Middle Attacks Against SSL/TLS Encrypted Network Connections   SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. It is intended to be useful for network forensics, application security analysis and penetration testing. SSLsplit is designed to transparently terminate connections that are redirected to it using Read more…

Loading