Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

CHIPSEC - Platform Security Assessment Framework

CHIPSEC is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing...

View Article


Image may be NSFW.
Clik here to view.

BeRoot For Windows - Privilege Escalation Project

BeRoot(s) is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. A compiled version is available here.It will be added to the pupy project as a...

View Article


Image may be NSFW.
Clik here to view.

BeRoot For Linux - Privilege Escalation Project

BeRoot is a post exploitation tool to check common misconfigurations on Linux and Mac OS to find a way to escalate our privilege.To understand privilege escalation on these systems, you should...

View Article

Image may be NSFW.
Clik here to view.

Mquery - YARA Malware Query Accelerator (Web Frontend)

Ever had trouble searching for particular malware samples? This project is an analyst-friendly web GUI to look through your digital warehouse.mquery can be used to search through terabytes of malware...

View Article

Image may be NSFW.
Clik here to view.

MalwLess - Test Blue Team Detections Without Running Any Attack

MalwLess is an open source tool that allows you to simulate system compromise or attack behaviours without running processes or PoCs. The tool is designed to test Blue Team detections and SIEM...

View Article


Image may be NSFW.
Clik here to view.

Amass - In-depth Subdomain Enumeration

The Amass tool performs scraping of data sources, recursive brute forcing, crawling of web archives, permuting and altering of names and reverse DNS sweeping to obtain additional subdomain names....

View Article

Image may be NSFW.
Clik here to view.

Optiva Framework - Web Application Scanner

You can use this Framework on your website to check the security of your website by finding the vulnerability in your website or you can use this tool to Get admin panel search SQL injection by dork As...

View Article

Image may be NSFW.
Clik here to view.

Stego-Toolkit - Collection Of Steganography Tools (Helps With CTF Challenges)

This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes preinstalled with many popular (see list below) and...

View Article


Image may be NSFW.
Clik here to view.

Pspy - Monitor Linux Processes Without Root Permissions

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of...

View Article


Image may be NSFW.
Clik here to view.

Lynis 2.6.5 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article

Image may be NSFW.
Clik here to view.

Idisagree - Control Remote Computers Using Discord Bot

Control remote computers using discord bot and python 3.[ ! ] If your target is a windows system, you may want to compile your payload. Do this with py2exe or pyinstaller.MAINTAINERSAlisson Moretto |...

View Article

Image may be NSFW.
Clik here to view.

SubFinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For...

SubFinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and has been aimed as a successor to sublist3r...

View Article

Image may be NSFW.
Clik here to view.

The Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration...

The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose of conducting penetration testing...

View Article


Image may be NSFW.
Clik here to view.

Ikeext-Privesc - Windows IKEEXT DLL Hijacking Exploit Tool

This tool is intended for automatically detecting and exploiting the IKE and AuthIP IPsec Keyring Modules Service (IKEEXT) Missing DLL vulnerability.  DescriptionA major weakness is present in Windows...

View Article

Image may be NSFW.
Clik here to view.

Log Killer - Clear All Your Logs In (Linux/Windows) Servers

Log Killer is tool for [Linux/Windows] Servers. This tool will delete all your logs, just download the tool and run it on the server, if your server OS is Windows download the batch file but, if your...

View Article


Image may be NSFW.
Clik here to view.

Aker - SSH Bastion/Jump Host/Jumpserver

Aker is a security tool that helps you configure your own Linux ssh jump/bastion host. Named after an Egyptian mythology deity who guarded the borders, Aker would act as choke point through which all...

View Article

Image may be NSFW.
Clik here to view.

Firecall - Automate SSH Communication With Firewalls, Switches, Etc.

Automate SSH communication with firewalls, switches, etc.DescriptionThese scripts are designed to automate sending commands to a Cisco ASA firewall. The intended purpose here is to eliminate the need...

View Article


Image may be NSFW.
Clik here to view.

Masc - A Web Malware Scanner

A malware (web) scanner developed during CyperCamp Hackathon 2017.FeaturesAt the moment, there are some features avaiable for any type of website (custom or CMS) and some of them only available for...

View Article

Image may be NSFW.
Clik here to view.

Devploit v3.6 - Information Gathering Tool

Devploit is a simple python script to Information Gathering.Download:git clone https://github.com/joker25000/DevploitHow to use:cd Devploitchmod +x install./installRun in TerminalDevploit(To run in...

View Article

Image may be NSFW.
Clik here to view.

EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles...

Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search.This only works if their Facebook Profile is publicWhat does this do?In simple words...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>