
Changeslog: + Fix: accept remote connection from netcat + Dispatch des outputs dans les bon logs selon client ou serveur + Fix: accept remote connection…

Conventional WPA2 attacks work by listening for a handshake between client and Access Point. This full fourway handshake is then used in a dictonary attack….

Sometime forensic investigators need to process digital images as evidence. There are some tools around, otherwise it is difficult to deal with forensic analysis with…

Version: 15.01.07: + BUGFIX + * avoid huge memory consumtion (fix for issue/39) + CHANGES + * command line parsing improved + NEW + *…

Changelog v-0.1.8: + Some details added to the “.jshintrc” file + package.json Version updated. Bluebox-ng is a GPL VoIP/UC vulnerability scanner written using Node.js powers….

Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit) The main goals of this project is to implement an attack scenario as…

Changelog v-4.2 beta : 4.2 is a small update to add a new method to fetch the URL via curl if file_get_contents fails because of…

Tool DESCRIPTIONS: This tools lists information about remote target’s SSL certificate and tests the remote target according given list of ciphers. WHY? – Why a…