• Hacking
    Hacking
    NoXss Faster XSS Scanner Reflected-XSS DOM-XSS

    NoXss: Faster XSS Scanner, Reflected-XSS and DOM-XSS

    Emp3r0r Linux Post-Exploitation Framework

    Emp3r0r: Linux Post-Exploitation Framework

    Social_X Social Engineering And RAT

    Social_X: Social Engineering And RAT

  • Security
    Termshark A terminal UI for tshark inspired by Wireshark

    Termshark: A Terminal UI for tshark Inspired by Wireshark

    Infection Monkey Data Center Security Testing Tool

    Infection Monkey: Data Center Security Testing Tool

    ThreatMapper Identify Vulnerabilities in Running Containers

    ThreatMapper: Identify Vulnerabilities in Running Containers

    LBFH Information Gathering, Vulnerability Scanning and Crawling

    LBFH: Information Gathering, Vulnerability Scanning and Crawling

  • Pages
    • Contact
    • Cookie Policy
    • Privacy Policy
    • Terms and Conditions
  • Video
Latest
  • Latest
  • Oldest
  • Random
  • A to Z
  • Top Rated

Hacking

NoXss Faster XSS Scanner Reflected-XSS DOM-XSS
Hacking

NoXss: Faster XSS Scanner, Reflected-XSS and DOM-XSS

NoXss is a cross-site script vulnerability scanner supported reflected xss and dom-based xss. It’s very fast and suitable for testing... Read More
ParadoxiaRat Native Windows Remote access Tool
Hacking

ParadoxiaRat: Native Windows Remote access Tool

There are many different types of RATs, but those that run on Windows computers are common. paradoxiaRAT is one of... Read More
Priest Extract Server and IP Address Info from Browser SSRF
Hacking

Priest: Extract Server and IP Address Info from Browser SSRF

Priest is a simple index.html file containing JavaScript code which can extract useful information from Browser SSRF Vulnerabilities What Inforamtion... Read More
Phirautee A Proof of Concept Crypto Virus
Hacking

Phirautee: A Proof of Concept Crypto Virus

A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely... Read More
Emp3r0r Linux Post-Exploitation Framework
Hacking

Emp3r0r: Linux Post-Exploitation Framework

Why another post-exploitation tool? why not? i dont see many post-exploitation frameworks for linux systems, even if there were, they... Read More
LitePhish Phishing Tool with Graphical Panel 19 Templates
Hacking

LitePhish: Phishing Tool with Graphical Panel 19+ Pages

LitePhish provides lite weight phishing pages with clean and minimal interface. It is modified and lite version of grayfish. Available... Read More
ShellShockHunter Tool Test Vulnerability Shellshock
Hacking

ShellShockHunter: Tool for Test Vulnerability Shellshock

It’s a simple tool for test vulnerability shellshock Shellshock (software bug) Shellshock, also known as Bashdoor, is a family of... Read More
BlackMamba Framework de Mando y Control Post Exploitación
Hacking

BlackMamba: C2/Post-Exploitation Framework

BlackMamba is a multi client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some... Read More
Social_X Social Engineering And RAT
Hacking

Social_X: Social Engineering And RAT

Social_X is a Social Engineering And Remote Access Trojan Tool. You can generate png/jpg/docx/xml etc. looking exe files. Social_X is... Read More
Eyeballer Convolutional Neural Network for Analyzing Pentest Screenshots
Hacking

Eyeballer: Convolutional Neural Network for Analyzing Pentest Screenshots

Give those screenshots of yours a quick eyeballing. Eyeballer is meant for large-scope network penetration tests where you need to... Read More
WordSmith Password Cracking RAR and ZIP Files
Hacking

WordSmith: Password Cracking RAR and ZIP Files

Password cracking software written in python using Tkinter. Supports rar and zip files. Password Cracking is a method of recovering... Read More
Search-That-Hash Cracking Hash Quickly
Hacking

Search-That-Hash: Cracking Hash Quickly

The Fastest Hash Cracking System Tired of going to every website to crack your hash? Search-That-Hash automates this process in... Read More
Load More
Copyright 2020 GeekScripts
  • Homepage
  • Privacy Policy
Start typing to see results or hit ESC to close
Pentesting OSINT Reconnaissance Framework Enumeration
See all results