Kalitorify Logo - Transparent Proxy through Tor for Kali Linux xploitlab

Kalitorify – Transparent Proxy through Tor for Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network.

Read more »
Bettercap - intercept communications with man in the middle attack

Bettercap – The Swiss Army knife for 802.11, BLE and MITM Attacks and Ethernet Networks Reconnaissance

Bettercap is a powerful, easy to use, all-in-one solution for performing reconnaissance and attacking WiFi networks, Main in the middle attack and more.

Read more »
Maltrail Report - Malicious Traffic Detection System xploitlab

Maltrail – Malicious Traffic Detection System

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails.

Read more »
Evillimiter show block hosts xploitlab

Evillimiter – Tool To Control Network Traffic/Bandwidth And Block Devices Without Access

Evillimiter is a tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access.

Read more »
Airgeddon - Multi-use Bash Script To Audit Wireless Networks xploitlab

Airgeddon – Multi-use Bash Script To Audit Wireless Networks

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Test your wireless security and Perform any wireless attack in one tools.

Read more »
Evilginx2 Video - MiTM Framework Used For Phishing That Allow To Bypass 2-factor Authentication

Evilginx2 – MiTM Framework Used For Phishing That Allow To Bypass 2-factor Authentication

evilginx2 is a man-in-the-middle attack framework used for phishing login credentials, which in turn allows to bypass 2-factor authentication protection.

Read more »
HackerTarget Toolkit - HackerTarget - Tools And Network Intelligence xploitlab

HackerTarget – Tools And Network Intelligence To Identification of Security Vulnerabilities

HackerTarget is a tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities.

Read more »