Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture...
Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and...
View ArticleMetateta - Automated Tool For Scanning And Exploiting Network Protocols Using...
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit For faster pen testing for large networksWhat You Can DoScanning with all metasploit modules for specific network...
View ArticleTakeover - SubDomain TakeOver Vulnerability Scanner
Sub-domain takeovervulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up a...
View ArticleM4Ngl3M3 - Common Password Pattern Generator Using Strings List
Common password pattern generator using strings list.Quick Installation:$ git clone https://github.com/localh0t/m4ngl3m3$ cd m4ngl3m3$ ./main.pyBasic Help:usage: main.py [-h] [-fy FROM_YEAR] [-ty...
View ArticleOne-Lin3r v1.1 - Gives You One-Liners That Aids In Penetration Testing...
One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit.It consists of various one-liners that aids in penetration testing operations:Reverser: Give it IP &...
View ArticleRiskySPN - Detect And Abuse Risky SPNs
RiskySPNs is a collection of PowerShellscripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue teams to identify potentially risky...
View ArticlewpCrack - Wordpress Hash Cracker
Wordpress Hash Cracker.Installationgit clone https://github.com/MrSqar-Ye/wpCrack.gitVideoDownload wpCrack
View ArticlePwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks
Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is intentionally vulnerable to all kinds of silly...
View ArticleSslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root...
Is an open source tool to help you build a valid SSL certificate chain from the root certificate to the end-user certificate. Also can help you fix the incomplete certificate chain and download all...
View ArticleProbequest - Toolkit For Playing With Wi-Fi Probe Requests
Toolkit allowing to sniff and display the Wi-Fi probe requests passing near your wireless interface.Probe requests are sent by a station to elicit information about access points, in particular to...
View ArticlePE Linux - Linux Privilege Escalation Tool
New LinuxPrivilege Escalation Tool.Getting StartedSystem Information GathererKernel Information GathererChecking Development environments on the system (Escaping Restricted Shells)Extract PATH &...
View ArticleVOOKI - Web Application Vulnerability Scanner
Vooki is a free web application vulnerability scanner. Vooki is a user-friendly tool that you can easily scan any web application and find the vulnerabilities. Vooki includes Web Application Scanner,...
View ArticleSubOver v1.1.1 - A Powerful Subdomain Takeover Tool
Subover is a Hostile Subdomain Takeover tool originally written in python but rewritten from scratch in Golang. Since it's redesign, it has been aimed with speed and efficiency in mind. Till date,...
View ArticleImpacket - Collection Of Python Classes For Working With Network Protocols
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and...
View ArticleCMSeeK - CMS Detection And Exploitation Suite
What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
View ArticleOperative Framework HD - The Digital Investigation Framework, You Can...
operative framework HD is the digital investigation framework, you can interact with websites, email address, company, people, ip address ... with basic/graphical view and export with XML, JSON.How to...
View ArticleCrypto Identifier - Tool To Uncipher Data Using Multiple Algorithms And Block...
Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on unknown cipher text and key dictionary.Supported Algorithms...
View ArticleLeakScraper - An Efficient Set Of Tools To Process And Visualize Huge Text...
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. These tools are designed to help pentesters/redteamers doing OSINT, credentials gathering and...
View ArticleLNK-Kisser - PowerShell Link Payload Generator
Making FUD Shortcut (.lnk) payloads with LNK-KISSER to remote execute malicious code.Shortcut-Payload-GeneratorExploiting Powershell to make ShortCut Payloads [fud].There is too much of awsome tricks...
View ArticleFuxi Scanner - Network Security Vulnerability Scanner
Fuxi Scanner is an open source network security vulnerability scanner, it comes with multiple functions.Vulnerability detection & managementAuthentication TesterIT asset discovery&...
View Article