Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

RouterSploit v3.0 - Exploitation Framework For Embedded Devices

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.It consists of various modules that aids penetration testing operations:exploits - modules that take...

View Article


Image may be NSFW.
Clik here to view.

DefectDojo - Application Vulnerability Correlation And Security Orchestration...

DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans,...

View Article


Image may be NSFW.
Clik here to view.

Backdoorme - Powerful Auto-Backdooring Utility

Tools like metasploit are great for exploiting computers, but what happens after you've gained access to a computer? Backdoorme answers that question by unleashing a slew of backdoors to establish...

View Article

Image may be NSFW.
Clik here to view.

BlackArch Linux v2018.06.01 - Penetration Testing Distribution

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1981tools. You can install tools individually or in groups. BlackArch Linux...

View Article

Image may be NSFW.
Clik here to view.

CSS Keylogger - Chrome Extension And Express Server That Exploits Keylogging...

Chrome extension and Express server that exploits keylogging abilities of CSS.To useSetup Chrome extensionDownload repository git clone https://github.com/maxchehab/CSS-KeyloggingVisit...

View Article


Image may be NSFW.
Clik here to view.

DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital...

DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.DARKSURGEON has three stated goals:Accelerate incident response, digital...

View Article

Image may be NSFW.
Clik here to view.

DejaVU - Open Source Deception Framework

Deception techniques if deployed well can be very effective for organizations to improve network defense and can be a useful arsenal for blue teams to detect attacks at very early stage of cyber kill...

View Article

Image may be NSFW.
Clik here to view.

DumpsterDiver - Tool To Search Secrets In Various Filetypes

DumpsterDiver is a tool used to analyze big volumes of various file types in search of hardcoded secret keys (e.g. AWS Access Key, Azure Share Key or SSH keys). Additionally, it allows creating a...

View Article


Image may be NSFW.
Clik here to view.

PhpSploit - Stealth Post-Exploitation Framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access...

View Article


Image may be NSFW.
Clik here to view.

Wifite 2.1.0 - Automated Wireless Attack Tool

A complete re-write of wifite, a Python script for auditing wireless networks.Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!What's new in...

View Article

Image may be NSFW.
Clik here to view.

AutoSQLi - An Automatic SQL Injection Tool Which Takes Advantage Of Googler,...

An Automatic SQL Injection Tool Which Takes Advantage Of ~DorkNet~ Googler, Ddgr, WhatWaf And Sqlmap.FeaturesSave System - there is a complete save system, which can resume even when your pc crashed. -...

View Article

Image may be NSFW.
Clik here to view.

SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Points

SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque...

View Article

Image may be NSFW.
Clik here to view.

Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than...

Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.Use:Search available username: ./namechk.sh <username> -auSearch available username on...

View Article


Image may be NSFW.
Clik here to view.

Msploitego - Pentesting Suite For Maltego Based On Data In A Metasploit Database

msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even...

View Article

Image may be NSFW.
Clik here to view.

Hash-Buster v2.0 - Tool Which Uses Several APIs To Perform Hash Lookups

FeaturesAutomatic hash type identificationSupports MD5, SHA1, SHA2Can extract & crack hashes from a fileCan find hashes from a directory, recursively6 robust APIsAs powerful as Hulk, as intelligent...

View Article


Image may be NSFW.
Clik here to view.

BadMod v2.0 - Detect Website CMS, Website Scanner & Auto Exploiter

Auto exploiter & get all server sites & bing dorker.Version 2.0Fixed colors bugFixed permissions bugAdded new option to scan single targetAdded new option to scan joomla& wordpress...

View Article

Image may be NSFW.
Clik here to view.

Gpredict - Satellite Tracking Application

Gpredict is a real-time satellite tracking and orbit prediction application. It can track a large number of satellites and display their position and other data in lists, tables, maps, and polar plots...

View Article


Image may be NSFW.
Clik here to view.

Omnibus - Open Source Intelligence Collection, Research, And Artifact Management

An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source...

View Article

Image may be NSFW.
Clik here to view.

Nipe - A Script To Make TOR Network Your Default Gateway

Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by...

View Article

Image may be NSFW.
Clik here to view.

Rastrea2R - Collecting &Amp; Hunting For IOCs With Gusto And Style

Ever wanted to turn your AV console into an Incident Response& Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>