Evil-WinRM Menu - The ultimate Windows Remote Management Shell for Hacking

Evil-WinRM – The ultimate Windows Remote Management Shell for Hacking/Pentesting

Evil WinRM is The ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.

Read more »
Hijacker WiFi Hacking Application xploitlab

Hijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

Hijacker is an application that contains variety WiFi hacking tools. With Graphical User Interface you can run this tool without typing any commands.

Read more »
Tails Logo - Encrypted and Anonymous Operating System

Tails – Encrypted and Anonymous Operating System

Tails, an encrypted and anonymous OS that helps you to use the Internet anonymously and circumvent censorship anywhere you go and leaving no trace.

Read more »
Swift Logo - Protects iOS Apps Against Reverse Engineering Attacks

SwiftShield – Protects iOS Apps Against Reverse Engineering Attacks

SwiftShield is a tool that generates irreversible, encrypted names for your iOS project’s objects to protect your app from reverse engineering attack.

Read more »
Mobile Security Framework (MobSF) Static Analysis - Android APK xploitlab

Mobile Security Framework (MobSF) – All-in-one Mobile Application Security (Android/iOS/Windows)

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment

Read more »
Andromeda - Interactive Reverse Engineering Tool for Android Applications xploitlab

Andromeda – Interactive Reverse Engineering Tool for Android Applications

Andromeda is Interactive Reverse Engineering Tool for Android Applications, makes initial reverse engineering work of Android apps bit faster and easier.

Read more »
Kalitorify Logo - Transparent Proxy through Tor for Kali Linux xploitlab

Kalitorify – Transparent Proxy through Tor for Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network.

Read more »