Category: EHC

0

iCloudBrutter – AppleID Bruteforce

iCloudBrutter is a simple python (3.x) script to perform basic bruteforce attack againts AppleID. Usage of iCloudBrutter for attacking targets without prior mutual consent is illegal. iCloudBrutter developer not responsible to any damage caused by iCloudBrutter....

0

Project Walrus – An Android App for RFID Card Cloning

Walrus is an Android app that simplifies using several existing contactless card cloning devices during red team engagements and physical security assessments. It offers a common interface and database for storing cloned cards. Currently,...

0

OWASP SecureTea Tool Project

The OWASP SecureTea Project is a application designed to help Secure a person’s laptop or computer with IoT (Internet Of Things) for notify users via twitter, whenever anyone accessing his laptop or computer. Description The...

0

Net Ghost – Fresh Proxy Scraper & Checker

Hi Guys Hope you liked the video. Net Ghost is the ultimate free solution for all your proxy needs. If you’re looking for a free, simple and, easy to use program which will get...

0

ZIB – The Open Tor Botnet

ZIB is fully undetectable and bypasses all antivirus by running on top of Python27’s pyinstaller, which is used for many legitimate programs. The only possibility of detection comes from the script, however, the script...

0

SCOT – Sandia Cyber Omni Tracker

The Sandia Cyber Omni Tracker (SCOT) is a cyber security incident response management system and knowledge base. Designed by cyber security incident responders, SCOT provides a new approach to manage security alerts, analyze data...