XVNA - Extreme Vulnerable Node Application
XVNA is an extreme vulnerable node application coded in Nodejs(Expressjs)/MongoDB that helps security enthusiasts to learn application security. it's not counseled to host this application online as it...
View ArticleMemcrashed-DDoS-Exploit - DDoS Attack Tool For Sending Forged UDP Packets To...
This tool allows you to send forged UDP packets to Memcached servers obtained from Shodan.ioPrerequisitesThe only thing you need installed is Python 3.xapt-get install python3You also require to have...
View ArticleFirefox Tunnel - The Way To Use Firefox To Make A Tunnel To Remote Communication
The way to use firefox to make a tunnel to remote communication. For I/O of payloads uses cookie.sqlite and html with javascript to auto submit, the browser runs in hidden mode.Read the...
View ArticlePowershell-RAT - Python Based Backdoor That Uses Gmail To Exfiltrate Data...
Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment.This RAT will help someone during red team engagements to backdoor any Windows machines. It tracks the user activity...
View ArticleDefenseMatrix - Full security solution for Linux Servers
Full security solution for Linux Servers.SCUTUM is to be added into DefenseMatrix ProjectAfter consideration, SCUTUM, as a nice firewall controller, is to be added into DefenseMatrix. It will soon...
View ArticleTh3Inspector - Tool for Information Gathering
Tool For Information Gathering.UsageShort FormLong FormDescription-i--infoWebsite Information-n--numberPhone Number Information-mx--mailserverFind IP Address And E-mail Server-w--whoisDomain Whois...
View ArticleCBM - Car Backdoor Maker
A hardware-backdoor for CAN bus - by @UnaPibaGeek & @holesecFor the first time, a hardware backdoor tool is presented having several advanced features, such as: remote control via SMS commands,...
View ArticleStaCoAn - Crossplatform tool which aids developers, bugbounty hunters and...
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications*.This tool will look for interesting lines in the...
View ArticleTaipan - Web Application Security Scanner
Taipan is a an automated web application scanner which allows to identify web vulnerabilities in an automatic fashion. This project is the core engine of a broader project which include other...
View ArticleGetAltName - Get Subject Alt Name From SSL Certificates
GetAltName it's a little script that can extract Subject Alt Names for SSL Certificates directly from HTTPS web sites which can provide you with DNS names or virtual servers.It's useful in a discovery...
View ArticleConverto - Installing Kali Linux On VPS Server
Installing Kali Linux On VPS Server.Steps For Installing :-1.sudo apt-get update2.sudo apt-get install git3.git clone https://github.com/developerkunal/Converto.git4.cd Converto.5.chmod +x...
View ArticleS3Scanner - Scan For Open S3 Buckets And Dump
A quick and dirty script to find unsecured S3 buckets and dump their contents.UsingThe tool has 2 parts:1 - s3finder.pyThis script takes a list of domain names and checks if they're hosted on Amazon...
View ArticleWPHunter - Wordpress Vulnerability Scanner
You can use this tool on your wordpress website to check the security of your website by finding the vulnerability in your website.Over 75 million websites run on WordPress. which is now powers 26% of...
View ArticleNmap 7.70 - Free Security Scanner: Better service and OS detection, 9 new NSE...
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory,...
View ArticleWPSeku v0.4 - Wordpress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Installation$ git clone https://github.com/m4ll0k/WPSeku.git...
View ArticleWhatCMS - CMS Detection And Exploit Kit Based On Whatcms.org API
CMS Detection and Exploit Kit based on Whatcms.org API.IntroductionWhatcms.sh can currently detect the use of more than 330 different CMS applications and services to later indicate a list of valid...
View ArticleCLOUDKiLL3R - Bypasses Cloudflare Protection Service Via TOR Browser
CLOUDKiLL3R bypasses Cloudflare protection service via TOR Browser !CLOUDKiLL3R Requirements :TOR Browser to scan as many sites as you want :)Python CompilerCLOUDKiLL3R Installation ?Make sure that TOR...
View ArticleODIN - Tool For Automating Penetration Testing Tasks
ODIN is made possible through the help, input, and work provided by others. Therefore, this project is entirely open source and available to all to use/modify. All this developer did was assemble the...
View ArticleiCloudBrutter - AppleID Bruteforce
iCloudBrutter is a simple python (3.x) script to perform basic bruteforce attack againts AppleID.Usage of iCloudBrutter for attacking targets without prior mutual consent is illegal. iCloudBrutter...
View ArticlePyRexecd - Standalone SSH Server For Windows
PyRexecd is a standalone SSH server for Windows.Features:Standalone Win32 app (not a service) that resides in SysTray.Supports a single user / pubkey auth only.Notifies incoming connections via...
View Article