Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[Exploit Pack] The most advanced and easy to use tool for pentesters

Exploit Pack is an open source GPLv3 licensed bundle of scripts ( known as exploits ) with an easy to use GUI and a SID IDE. It’s built on JAVA and Python, which means it’s easy to customize and works...

View Article


Image may be NSFW.
Clik here to view.

[ike-scan] Discover & Fingerprint IKE Hosts (IPsec VPN Servers)

ike-scan discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern. ike-scan can perform the following functions:Discovery Determine which hosts in a given IP range are...

View Article


Image may be NSFW.
Clik here to view.

[Wapiti 2.3.0] Web Application Vulnerability Scanner

Wapiti allows you to audit the security of your web applications.It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed...

View Article

Image may be NSFW.
Clik here to view.

[Wireless Attack Toolkit (WAT)] A push-button wireless hacking and...

This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more).It provides users with automated wireless attack tools that air paired with...

View Article

Image may be NSFW.
Clik here to view.

[Splinter] RAT open source

Splinter The Rat es una RAT (Remote Administration Tool). Este tipo de herramientas normalmente nos permite tomar el control de un bot (sistema comprometido).Splinter The Rat actúa como BotMaster o...

View Article


Image may be NSFW.
Clik here to view.

[SQL injection test environment] A collection of web pages vulnerable to SQL...

A collection of web pages vulnerable to SQL injection flaws and more:conf/ - operating system configuration files used by deployment.sh.dbs/ - standalone databases for some database management systems...

View Article

Image may be NSFW.
Clik here to view.

[MKBRUTUS] Password bruteforcer for MikroTik devices or boxes running RouterOS

Mikrotik brand devices (www.mikrotik.com), which runs the RouterOS operative system, are worldwide known and popular with a high networking market penetration. Many companies choose them as they are a...

View Article

Image may be NSFW.
Clik here to view.

[Canaima GNU/Linux] Distro socio-tecnológica

Canaima GNU/Linux es un proyecto socio-tecnológico abierto, construido de forma colaborativa, centrado en el desarrollo de herramientas y modelos productivos basados en las Tecnologías de Información...

View Article


Image may be NSFW.
Clik here to view.

[Orchid] Tor Client for Java

Orchid is a Tor client implementation and library written in pure Java. It was written from the Tor specification documents, which are available here. Orchid runs on Java 5+ and the Android devices.How...

View Article


Image may be NSFW.
Clik here to view.

[sb0x] Caja de herramientas para pruebas de penetración

Ruquirment Sistema: para ejecutar sb0x necesita instalar Python 2.7.xCaracterísticas Herramientas:1. WordPress fuerza bruta 2. Escáner servidor 3. Web de administración buscador 4. FTP fuerza bruta del...

View Article

Image may be NSFW.
Clik here to view.

[SkyJack] Drone engineered to autonomously seek out, hack, and wirelessly...

SkyJack is a drone engineered to autonomously seek out, hack, and wirelessly take full control over any other drones within wireless or flying distance, creating an army of zombie drones under your...

View Article

Image may be NSFW.
Clik here to view.

[Python eBooks] Free eBooks to learn Python

Think Python Learn Python the Hard way, 3rd editionAdvance Python Features Gone BadInvent Your Own Computer Game With PythonHacking Secret Ciphers With Python

View Article

Image may be NSFW.
Clik here to view.

[NOSQLMap] NoSQLMap-Automated NoSQL Database pwnage

What is NoSQLMap?NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases, as well as web...

View Article


Image may be NSFW.
Clik here to view.

[Evil Foca] IPv4 and IPv6 Penetration testing tool

Evil Foca is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data networks. The tool is capable to do different attacks such as:MITM on IPv4 networks using ARP...

View Article

Image may be NSFW.
Clik here to view.

[Sandboxie] Sandbox Your Browser / Software / Programs In Windows

Sandboxie enables you to easily sandbox your browser and other programs, it runs your applications in an isolated abstraction area called a sandbox. Under the supervision of Sandboxie, an application...

View Article


Image may be NSFW.
Clik here to view.

[Blue|Smash] Bluetooth Penetration Testing Suite

Blue|Smash is a free open source bluetooth pentest suite, powered by python for linux. I built Blue|Smash to aid me in my bluetooth adventures and thought others might benefit from my work :D. Here is...

View Article

Image may be NSFW.
Clik here to view.

[THC-Hydra 7.5] Fast Parallel Network Logon Cracker

Hydra is a parallelized network logon cracker which supports numerous protocols to attack, new modules are easy to add, beside that, it is flexible and very fast.FeaturesIPv6 Support Graphic User...

View Article


Image may be NSFW.
Clik here to view.

[Sahi] Web Test Automation Tool

Sahi Pro is a powerful tool for automation of web application testing. Sahi Pro helps test web applications across different browsers with high reliability and low maintenance. Existing testing teams...

View Article

Image may be NSFW.
Clik here to view.

[IP-reputation-snort-rule-generator] A tool to generate Snort rules based on...

A tool to generate Snort rules or Cisco IDS signatures based on public IP/domain reputation data.Usage./tepig.pl [ [--file=LOCAL_FILE] | [--url=URL] ] [--csv=FIELD_NUM] [--sid=INITIAL_SID]...

View Article

Image may be NSFW.
Clik here to view.

[Harald scan] Bluetooth discovery scanning

Harald Scan is able to determine Major and Minor device class of device, as well as attempt to resolve the device's MAC address to the largest known Bluetooth MAC address Vendor list. If you are...

View Article
Browsing all 5816 articles
Browse latest View live