Cyber criminals use different methods of attacks to get your personal data, and phishing fraud is one of them.
Phishing scams are usually fraudulent email messages that come from legitimate businesses (for example, your university, your Internet service provider, your bank, or your online...
Satellite - Easy-To-Use Payload Hosting
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This can also be a useful service for hosting files that should be only accessed in very specific circumstances.
Quickstart Guide...
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system.
Why not use a traditional Backconnect/Bind Shell?
PostShell...
WPCracker
WordPress user enumeration and login Brute Force tool for Windows and Linux
With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
Weapons
OS
Type
Name
Description
All
Analysis
RMS-Runtime-Mobile-Security
Runtime Mobile Security (RMS) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
All
Analysis
scrounger
Mobile application testing toolkit
All
Proxy
BurpSuite
The...
UhOh365
A script that can see if an email address is valid in Office365. This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.
Microsoft does not consider "email enumeration" a...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).
Legal Disclaimer:
Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...