Tor-Router - Use TOR as a Transparent Proxy and Send All Your Trafic Under TOR

Tor-Router – Use TOR as a Transparent Proxy and Send All Your Trafic Under TOR

Tor Router allow you to use TOR as a transparent proxy and send all your trafic under TOR including DNS requests.

Read more »
Wifiphisher - how to get wifi password without brute force

Wifiphisher – Most Complete and Easy WiFi Security Tool

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Tool to help you hack WiFi.

Read more »
XSRFProbe - Advanced CSRF or XSRF Audit and Exploitation Toolkit

XSRFProbe – Advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit

XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a Powerful Crawling Engine.

Read more »
BrainDamage - Remote computer and control with telegram

BrainDamage – Remote Administration Tool Which Uses Telegram as Command & Control Server

BrainDamage is a fully featured backdoor that uses telegram as a command and control server, which means, you can control victim devices from telegram.

Read more »
InstaPy - Tool for Automated Instagram Interactions

InstaPy – Tool for Automated Instagram Interactions

InstaPy is a Tool that automates your social media interactions to “farm” Likes, Comments, and Followers on Instagram.

Read more »
Architecture o365 attack toolkit

o365-attack-toolkit – Tool To Attack Office 365

o365-attack-toolkit is a tool to attack office 365, perform OAuth phishing attack and use the Microsoft Graph API to extract interesting information.

Read more »
Osmedeus UI - The Most Complete Reconnaissance Tool and Vulnerability Scanning xploitlab

Osmedeus – The Most Complete Reconnaissance Tool and Vulnerability Scanning

Osmedeus is fully automated offensive security tool, run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

Read more »