BuckleGripper Logo

BuckleGripper

0
Free
Visit Website

Given a suspected phishing url or file of line separated urls, visit, screenshot, and scrape for interesting files. Visit a suspected phishing page, screenshot it and pillage it for phishing archives. Example of reading in a single url: `$ python bucklegripper.py -s openphish -u http://www.govwebsearch.com/apc/opc/pdp/safe/optusnet.com.au/Login.html`.

FEATURES

ALTERNATIVES

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

ISF (Industrial Exploitation Framework) - An exploitation framework for industrial systems with various ICS protocol clients and exploit modules.

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

Preparation process for participating in the Pacific Rim CCDC 2015.

Data exfiltration & infiltration tool using text-based steganography to evade security controls.

A tool that simplifies the installation of tools and configuration for Kali Linux

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

A penetration testing tool that focuses on web browser exploitation

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved