Firebase Exploiting Tool - Exploiting Misconfigured Firebase Databases
Exploiting vulnerable/misconfigured Firebase databasesPrerequisitesNon-standard python modules:dnsdumpsterbs4requestsInstallationIf the following commands run successfully, you are ready to use the...
View ArticlePure Blood - A Penetration Testing Framework Created For Hackers / Pentester...
A Penetration Testing Framework created for Hackers / Pentester / Bug HunterMenuWeb Pentest | Banner Grab | Whois | Traceroute| DNS Record | Reverse DNS Lookup | Zone Transfer Lookup | Port Scan |...
View ArticleROPGenerator - Tool That Helps You Building ROP Exploits By Finding And...
ROPGenerator is a tool that makes ROP exploits easy. It enables you to automatically find gadgets or build ROP chains. The current version supports x86 and x64 binaries.OverviewROPGenerator uses the...
View ArticleIbombshell - Dynamic Remote Shell
ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in some cases exploitation). It is a shell that is downloaded...
View ArticleKillerBee - IEEE 802.15.4/ZigBee Security Research Toolkit
This is KillerBee - Framework and Tools for Attacking ZigBee and IEEE 802.15.4 networks.REQUIREMENTSKillerBee is developed and tested on Linux systems. OS X usage is possible but not supported.We have...
View ArticleCloudMapper - Tool To Analyze Your Amazon Web Services (AWS) Environments
CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser. It now contains more...
View ArticleMemoro - A Detailed Heap Profiler
Memoro is a highly detailed heap profiler.Memoro not only shows you where and when your program makes heap allocations, but will show you how your program actually used that memory.Memoro collects...
View ArticleAircrack-ng 1.3 - Complete Suite Of Tools To Assess WiFi Network Security
Aircrack-ng is a complete suite of tools to assess WiFi network security.It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further...
View ArticleLogonTracer - Investigate Malicious Windows Logon By Visualizing And...
Investigate malicious logon by visualizing and analyzing Windowsactive directory event logs.ConceptLogonTracer associates a host name (or an IP address) and account name found in logon-related events...
View ArticleNeofetch - A Command-Line System Information Tool
Neofetch is a command-line system information tool written in bash 3.2+. Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way.The...
View Articleipv4Bypass - Using IPv6 To Bypass Security
Using IPv6 to Bypass SecurityDependences (tested on Kali Linux)python2.7nmappython-nmap (https://pypi.org/project/python-nmap/)termcolor (https://pypi.org/project/termcolor/)Example on how to run the...
View ArticleNoisy - Simple Random DNS, HTTP/S Internet Traffic Noise Generator
A simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra...
View ArticleAWS Key Disabler - A Small Lambda Script That Will Disable Access Keys Older...
The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to reduce the risk associated with old access keys.AWS Lambda ArchitectureSysOps...
View ArticleSeeker - Find GeoLocation With High Accuracy
Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy.Other tools and services offer IP Geolocation which is not very accurate and does not...
View ArticleScan your exposure to domain and subdomain hijacking over 10's of cloud...
Domain Hijacking is a well-known security issue that can be carried in many different ways. In addition to social engineering or unauthorized access to the domain owner’s account, the exploitation of...
View ArticleCamelishing - Social Engineering Tool
CamelishingSocial Engineering ToolFeaturesBulk email sendingBasic Python Agent CreatorOffice Excel Macro CreatorDDE Excel Creator(or Custom Payload)Return İnformation[Mail Open Track][Agent Open...
View ArticleSecurity Monkey - Tool To Monitors Your AWS And GCP Accounts For Policy...
Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. Security Monkey can also watch...
View ArticleCMSeeK v1.0.5 - CMS Detection And Exploitation Suite
What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
View ArticleScout2 - Security Auditing Tool For AWS Environments
Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual inspection and highlights high-risk...
View ArticleHindsight - Internet History Forensics For Google Chrome/Chromium
Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded to support other Chromium-based applications (with more to...
View Article