Ghidra - NSA Sofware Reverse Engineering (SRE) Framework xploitlab

Ghidra – NSA Sofware Reverse Engineering (SRE) Framework

Ghidra is a software reverse engineering (SRE) framework, high-end software analysis tools created and maintained by the National Security Agency.

Read more »
DrMITM - Tool To Globally Log All Traffic Of a Website

DrMITM – Tool To Globally Log All Traffic Of a Website

Traffic log of a website is very important to check if any possible query that can exploit your site. DrMITM is a tool designed to globally log all traffic.

Read more »
Gophish - Open Source Phishing Toolkit xploitlab

Gophish – Open Source Phishing Toolkit

Gophish is an open-source phishing toolkit, quick and easy setup. Perform phishing attack on facebook, twitter, instagram or any log in pages.

Read more »
goop - perform google searches without being blocked or hitting limits

Goop – Google Search Scraper (perform google searches without being blocked or hitting limits)

Goop (Google Search Scraper) can perform google searches without being blocked by the CAPTCHA or hitting any rate limits.

Read more »
Aquatone - Tool For Visual Inspection of Websites and Domain Flyovers

Aquatone – Tool For Visual Inspection of Websites and Domain Flyovers

Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.

Read more »
Photon Output - OSINT Tools To Extracts URLs, Social Media Accounts, Emails

Photon – OSINT Tools To Extracts URLs, Social Media Accounts, Emails And More

Photon is a incredibly fast crawler designed for OSINT, with this tool you can extracts Emails, Subdomains, Social Media Accounts, Secret Keys and More.

Read more »
HackerTarget Toolkit - HackerTarget - Tools And Network Intelligence xploitlab

HackerTarget – Tools And Network Intelligence To Identification of Security Vulnerabilities

HackerTarget is a tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities.

Read more »