Mitm6 - Pwning IPv4 Via IPv6
Mitm6 is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server. It does this by replying to DHCPv6 messages, providing victims with a link-local IPv6...
View ArticleInvoke-Obfuscation - PowerShell Obfuscator
Invoke-Obfuscation is a PowerShell v2.0+ compatible PowerShell command and script obfuscator.PurposeAttackers and commodity malware have started using extremely basic obfuscation techniques to hide the...
View ArticleRevoke-Obfuscation - PowerShell Obfuscation Detection Framework
Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework.AuthorsDaniel Bohannon (@danielhbohannon) Lee Holmes (@Lee_Homes)ResearchBlog Post:...
View Articlemeg - Fetch Many Paths For Many Hosts (Without Killing The Hosts)
meg is a tool for fetching lots of URLs but still being 'nice' to servers.It can be used to fetch many paths for many hosts; fetching one path for all hosts before moving on to the next path and...
View Articlemeg+ - Automated Reconnaissance Wrapper
This wrapper will automate numerous tasks and help you during your reconnaissance process. The script finds common issues, low hanging fruit, and assists you when approaching a target. meg+ also allows...
View Articlecontact.sh - An OSINT tool to find contacts in order to report security...
An OSINT tool to find contacts in order to report security vulnerabilities.InstallationLinuxMake sure you have installed the whois and jq packages.$ git clone...
View Articleicebreaker - Gets Plaintext Active Directory Credentials If You'Re On The...
Break the ice with that cute Active Directory environment over there. Automates network attacks against Active Directory to deliver you piping hot plaintext credentials when you're inside the network...
View ArticlePoT - Phishing On Twitter
Generate tweet automatically like him/herHow it works?1- Collect data from target's twitter account2- Find target's friend and copy her/him account3- Generate tweet automatically with markov chain...
View ArticleShellen - Interactive Shellcoding Environment, In Which You Can Easily Craft...
Shellen is an interactive shellcoding environment. If you want a handy tool to write shellcodes, then shellen may be your friend. Also, it can be used just as assembly/disassembly tool.It uses keystone...
View ArticleWAScan - Web Application Scanner
WAScan ((W)eb (A)pplication (Scan)ner) is a Open Source web application security scanner. It is designed to find various vulnerabilities using "black-box" method, that means it won't study the source...
View ArticleProtobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown...
Simple program that can parse Google Protobuf encoded blobs (version 2 or 3) without knowing their accompanying definition. It will print a nice, colored representation of their contents. Example:As...
View ArticleNinja Shell - Port Knocking Technique With AES256-GCM
Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH.Raw socket ?Raw mode is basically there to allow...
View ArticlePrithvi - A Report Generation Tool For Security Assessment
A Report Generation Tool for Security AssessmentUsageThis project of ours could be used for report generation and its very easy to use.It includes following featuresWe can add Owasp Types and...
View ArticlePasshunt - Tool For Searching Of Default Credentials For Network Devices, Web...
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.How to install?git clone...
View ArticleBettercap v2.0 - The State Of The Art Network Attack And Monitoring Framework
bettercap is the Swiss army knife for network attacks and monitoring.How to InstallA precompiled version is available for each release, alternatively you can use the latest version of the source code...
View ArticleAutoSploit v2.0 - Automated Mass Exploiter
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom...
View ArticlePeanalyzer - Advanced Portable Executable File Analyzer And Disassembler
Advanced Portable Executable File AnalyzerPython 3.6.4 Tested (Working)Usagepython pyanalyzer.py --file file.exe --show allpython pyanalyzer.py --file file.exe --disassemble allVideoDos HeaderFile...
View ArticleCrawlBox - Easy Way To Brute-Force Web Directory.
Easy way to brute-force web directory.Operating Systems TestedMacOSXUbuntu 16.04Usagepython crawlbox.py [-h] [-v] [-w WORDLIST] urlpositional arguments:url specific target url, like domain.comoptional...
View ArticleipChecker - Check If A IP Is From Tor Or Is A Malicious Proxy
Tool to check if a given IP is a node tor or an open proxy.Why?Sometimes all your throttles are not enough to stop brute force attacks or any kind of massive attacks, so it can help you to drop, some...
View ArticleCl0neMast3r - Git All Your Favorite Tools In One Click
Cl0neMast3r is a Python script that was coded to make your life easier. Now you can easily choose your favorite tools from GitHub and install them on your system with one click.Even better you can...
View Article