Tag Archives: Tools

GMER – Rootkit Detector and Remover

Sometimes rootkit can be hidden in standard operating system services and this will be skipped by security software. If you are looking to check system against rootkit you can use GMER.

EAPHAMMER- Targeted Evil Twin Attacks WPA2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements.

Datasploit – Automated Open Source Intelligence (OSINT) Tool

DataSploit brings penetration tester a method to correlate raw data captured and gives the user, all the relevant information about the domain / email / phone number / person, etc.

Wifiphisher – Automated Wi-Fi clients Phishing Tool

Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malwares.

Cypher – Pythonic ransomware proof of concept

Cypher is a proof of concept ransomware which implements the PyCrpto module and uses gmail as a simple command and control server.

AIL framework – Analysis Information Leak framework

AIL framework is a modular framework to analyze potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams.

DeepViolet – Tool for Introspection SSL\TLS Sessions


DeepViolet is a TLS/SSL scanning API written in Java. To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.