Espionage Logo - A Network Traffic Interceptor For Linux Shows a Live Feed of Traffic

Espionage – A Network Traffic Interceptor For Linux Shows a Live Feed of Traffic

Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows to capture a live of traffic.

Read more »
FATT - Capture Network Metadata and Fingerprints From PCAP Files And Live Network Traffic

FATT – Script For Extracting Network Metadata and Fingerprints From PCAP Files And Live Network Traffic

Fatt is a script for extracting network metadata and also fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic.

Read more »
Amass - Attack Surface Mapping and External Asset Discovery

Amass – In-depth DNS Enumeration, Attack Surface Mapping and External Asset Discovery

Amass is In-depth DNS Enumeration Tool, Attack Surface Mapping and External Asset Discovery. Developed by OWASP to help Penetration Testers.

Read more »
What is evil twin attack xploitlab

Eaphammer – Targeted Evil Twin Attacks Against WPA2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments

Read more »
EHT Framework - Most Complete Penetration Testing Tools

EHT Framework – Most Complete Penetration Testing Tools

Ehtools (EHT) Framework is a complete penetration tools with more that 58 tools installed default and 100 tools you can install from ehtools.

Read more »
Hijacker WiFi Hacking Application xploitlab

Hijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

Hijacker is an application that contains variety WiFi hacking tools. With Graphical User Interface you can run this tool without typing any commands.

Read more »
sslsplit - Transparent SSL TLS interception

sslsplit – Transparent SSL/TLS interception

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. It is intended to be useful for network forensics.

Read more »