Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
The ultimate WinRM shell for hacking/pentesting
Transport coordinate between earth(WGS-84) and mars in china(GCJ-02).
Tool to analyze and test security in IPv4 and IPv6 data networks
Simple and clean SVG icon pack with the code to support Rails, Sprockets, Node.js, Gulp, Grunt and CDN
Evil Crow RF device.
<leader> key for evil
Detect Evil Maid Attacks
Automated Linux evil maid attack
Evil integration for Smartparens
Because CSS isn't evil enough already.
ESP8266-Evil Twin with deauth capability
Because not all paparazzis are evil!