Tools Category

Xerosploit

Efficient And Advanced Man In The Middle Framework Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Read more…

Loading

Tools Category

SSLsplit

Tool For Man-In-The-Middle Attacks Against SSL/TLS Encrypted Network Connections   SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. It is intended to be useful for network forensics, application security analysis and penetration testing. SSLsplit is designed to transparently terminate connections that are redirected to it using Read more…

Loading

Tools Category

Squidmagic

Analyze a Web-Based Network Traffic to Detect Central Command and Control (C&C) Servers and Malicious Site Squidmagic is a tool designed to analyze a web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus. Install Ubuntu 16.04 Clone this repo Read more…

Loading

Tools Category

PloitKit

The Hacker’s ToolBox   PloitKit is a Python based GUI tool designed as one-stop for all other softwares. I was facing these kinds of problem, when I need to switch to different system, or I lost my pen-drive. I have to go to google, and search every tool and download Read more…

Loading

Dr0p1t-Framework

A Framework That Creates An Advanced FUD Dropper With Some Tricks   Have you ever heard about trojan droppers ? In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chance to create a dropper that bypass most AVs and have some tricks 😉 Read more…

Loading

Tools Category

FalconGate

A smart gateway to stop hackers and Malware attacks Motivation Cyber attacks are on the raise. Hacker and cyber criminals are continuously improving their methods and building new tools and Malware with the purpose of hacking your network, spying on you and stealing valuable data. Recently a new business model Read more…

Loading