[Exploit Pack] The most advanced and easy to use tool for pentesters
Exploit Pack is an open source GPLv3 licensed bundle of scripts ( known as exploits ) with an easy to use GUI and a SID IDE. It’s built on JAVA and Python, which means it’s easy to customize and works...
View Article[ike-scan] Discover & Fingerprint IKE Hosts (IPsec VPN Servers)
ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan can perform the following functions:Discovery Determine which hosts in a given IP range are...
View Article[Wapiti 2.3.0] Web Application Vulnerability Scanner
Wapiti allows you to audit the security of your web applications.It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed...
View Article[Wireless Attack Toolkit (WAT)] A push-button wireless hacking and...
This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more).It provides users with automated wireless attack tools that air paired with...
View Article[Splinter] RAT open source
Splinter The Rat es una RAT (Remote Administration Tool). Este tipo de herramientas normalmente nos permite tomar el control de un bot (sistema comprometido).Splinter The Rat actúa como BotMaster o...
View Article[SQL injection test environment] A collection of web pages vulnerable to SQL...
A collection of web pages vulnerable to SQL injection flaws and more:conf/ - operating system configuration files used by deployment.sh.dbs/ - standalone databases for some database management systems...
View Article[MKBRUTUS] Password bruteforcer for MikroTik devices or boxes running RouterOS
Mikrotik brand devices (www.mikrotik.com), which runs the RouterOS operative system, are worldwide known and popular with a high networking market penetration. Many companies choose them as they are a...
View Article[Canaima GNU/Linux] Distro socio-tecnológica
Canaima GNU/Linux es un proyecto socio-tecnológico abierto, construido de forma colaborativa, centrado en el desarrollo de herramientas y modelos productivos basados en las Tecnologías de Información...
View Article[Orchid] Tor Client for Java
Orchid is a Tor client implementation and library written in pure Java. It was written from the Tor specification documents, which are available here. Orchid runs on Java 5+ and the Android devices.How...
View Article[sb0x] Caja de herramientas para pruebas de penetración
Ruquirment Sistema: para ejecutar sb0x necesita instalar Python 2.7.xCaracterísticas Herramientas:1. WordPress fuerza bruta 2. Escáner servidor 3. Web de administración buscador 4. FTP fuerza bruta del...
View Article[SkyJack] Drone engineered to autonomously seek out, hack, and wirelessly...
SkyJack is a drone engineered to autonomously seek out, hack, and wirelessly take full control over any other drones within wireless or flying distance, creating an army of zombie drones under your...
View Article[Python eBooks] Free eBooks to learn Python
Think Python Learn Python the Hard way, 3rd editionAdvance Python Features Gone BadInvent Your Own Computer Game With PythonHacking Secret Ciphers With Python
View Article[NOSQLMap] NoSQLMap-Automated NoSQL Database pwnage
What is NoSQLMap?NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases, as well as web...
View Article[Evil Foca] IPv4 and IPv6 Penetration testing tool
Evil Foca is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data networks. The tool is capable to do different attacks such as:MITM on IPv4 networks using ARP...
View Article[Sandboxie] Sandbox Your Browser / Software / Programs In Windows
Sandboxie enables you to easily sandbox your browser and other programs, it runs your applications in an isolated abstraction area called a sandbox. Under the supervision of Sandboxie, an application...
View Article[Blue|Smash] Bluetooth Penetration Testing Suite
Blue|Smash is a free open source bluetooth pentest suite, powered by python for linux. I built Blue|Smash to aid me in my bluetooth adventures and thought others might benefit from my work :D. Here is...
View Article[THC-Hydra 7.5] Fast Parallel Network Logon Cracker
Hydra is a parallelized network logon cracker which supports numerous protocols to attack, new modules are easy to add, beside that, it is flexible and very fast.FeaturesIPv6 Support Graphic User...
View Article[Sahi] Web Test Automation Tool
Sahi Pro is a powerful tool for automation of web application testing. Sahi Pro helps test web applications across different browsers with high reliability and low maintenance. Existing testing teams...
View Article[IP-reputation-snort-rule-generator] A tool to generate Snort rules based on...
A tool to generate Snort rules or Cisco IDS signatures based on public IP/domain reputation data.Usage./tepig.pl [ [--file=LOCAL_FILE] | [--url=URL] ] [--csv=FIELD_NUM] [--sid=INITIAL_SID]...
View Article[Harald scan] Bluetooth discovery scanning
Harald Scan is able to determine Major and Minor device class of device, as well as attempt to resolve the device's MAC address to the largest known Bluetooth MAC address Vendor list. If you are...
View Article