CATPHISH v0.0.5 – Domain Analyzer
June 12th, 2017 | by MaxiSoler
CATPHISH analyzes target domain to generate similar-looking domains for phishing attacksJune 12th, 2017 | by MaxiSoler
CATPHISH analyzes target domain to generate similar-looking domains for phishing attacksNovember 10th, 2016 | by MaxiSoler
IVRE is an open-source framework for network recon. It relies on open-source well-known tools (Nmap, Zmap, Masscan, Bro and p0f) [&hellipNovember 10th, 2016 | by MaxiSoler
nullinux is an internal penetration testing tool used for null session identification and enumeration. nullinux was written in the python [&hellipSeptember 19th, 2016 | by MaxiSoler
SsidyMetrics reports metrics of Wifi Pineapple PineAP log files. Script handles parsing and collation of multiple log files, storing them [&hellipJune 28th, 2016 | by MaxiSoler
TLS Fingerprinting are tools to enable the matching (either on the wire or via pcap), creation, and export of TLS [&hellipJune 8th, 2016 | by MaxiSoler
TLS Fingerprinting are tools to enable the matching (either on the wire or via pcap), creation, and export of TLS [&hellipSeptember 29th, 2014 | by MaxiSoler
Visualize Haka traffic in real-time using Kibana and Elasticsearch. Haka is an open source security oriented language which allows to [&hellipAugust 19th, 2014 | by MaxiSoler
Haka is an open source security oriented language which allows to describe protocols and apply security policies on (live) captured [&hellipApril 22nd, 2014 | by MaxiSoler
NINJA-PingU Is Not Just a Ping Utility is a free open-source high performance network scanner tool for large scale analyses. It [&hellipOctober 21st, 2013 | by NJ Ouchn
Doona is a fork of the Bruteforce Exploit Detector Tool (BED). BED is a program which is designed to check [&hellip