Anantha Innanje's Projects
Recovers passwords from pixelized screenshots
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
PowerShell module for Office 365 and Azure log collection
Fast directory scanning and scraping tool
DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by launching a dictionary based attack against a webserver and analyse its response.
Tools to assess the DNS security of web applications
Analyze the security of any domain by finding all the information possible. Made in python.
E4GL3OS1NT - Simple Information Gathering Tool
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
These are 10 lab programs under VTU syllabus 2018. The description of each program can be found in the readme file.
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
linux post-exploitation framework made by linux user
Entropy Exploit is an IP webcamera exploit also named CNVD-2017-02776, this is powerful exploitation tool for webcams testing!
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../
Convolutional neural network for analyzing pentest screenshots
ππΎ In April 2021, a huge collection of personal data containing more than 500 million users was released online. ππΏ The biggest threat, if your information is leaked, is phishing and personal harassment. π This free information is at your disposal. βοΈ Its sale is prohibited by other groups and channels. 𧨠Uploading 15 GB of Facebook information. β All information is compressed. π The initial volume without compression is equal to 150 GB. π€ͺ The first complete and flawless database in Telegram. π» Wait for free download
A versatile and modular post-exploitation framework. Enumerate, Escalate and pivot while keeping your scripts in ram and off disk.
Fake Windows logon screen to steal passwords
β‘Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" from #HackerOne #Bugcrowd #Intigriti ...
a static analysis tool for finding vulnerabilities in C/C++ source code
Tool to find metadata and hidden information in the documents.
C program to demonstrate how files and folders can be protected by hiding with the help of inbuilt dos commands.
A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.
FrameDomain Framework - subdomains enumeration tool for penetration testers
:wolf: Malware analysis platform
π The perfect Front-End Checklist for modern websites and meticulous developers