Penetration Testing Tools

Posts Tagged: exploitation

evilginx2

evilginx2 Description evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication […]

Pupy

Pupy Description Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python Pupy is a cross-platform, multi […]

Fern Wifi Cracker

Fern Wifi Cracker Description Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python […]

Bully

Bully Description Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that […]

WiFite

WiFite Description To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few […]

Scroll To Top

Рейтинг@Mail.ru