Read the license before using any part from this code 🙂Hiding executable files in PDF documentsLegal disclaimer:Usage of EvilPDF for …
RMIScout – Wordlist And Bruteforce Strategies To Enumerate Java RMI Functions And Exploit RMI Parameter Unmarshalling Vulnerabilities
RMIScout performs wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation.On misconfigured servers, …
Stegcloak – Hide Secrets With Invisible Characters In Plain Text Securely Using Passwords
StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside text by compressing and …
URLCrazy – Generate And Test Domain Typos And Variations To Detect And Perform Typo Squatting, URL Hijacking, Phishing, And Corporate Espionage
URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL …
Tangalanga – The Zoom Conference Scanner Hacking Tool
Zoom Conference scanner.This scanner will check for a random meeting id and return information if available.UsageThis are all the possible …
Words Scraper – Selenium Based Web Scraper To Generate Passwords List
Selenium based web scraper to generate passwords list. Installation # Download Firefox webdriver from https://github.com/mozilla/geckodriver/releases $ tar xzf geckodriver-v{VERSION-HERE}.tar.gz $ …
Astsu – A Network Scanner Tool
How it works Scan common ports Send a TCP Syn packet to the destination on the defined port, if the …
Recox – Master Script For Web Reconnaissance
The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other …
GitMonitor – A Github Scanning System To Look For Leaked Sensitive Information Based On Rules
GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are …
Ligolo – Reverse Tunneling Made Easy For Pentesters, By Pentesters
Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety …