Lynis 2.6.7 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleSocial Mapper - A Social Media Enumeration & Correlation Tool
A Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf)Social Mapper is a Open Source Intelligence Tool that uses facial recognition to correlate social...
View ArticleHashcat v4.2.1 - World's Fastest and Most Advanced Password Recovery Utility
hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs,...
View ArticleRouterSploit v3.3.0 - Exploitation Framework For Embedded Devices
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.It consists of various modules that aids penetration testing operations:exploits - modules that take...
View ArticleCMSeeK v1.0.7 - CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...
What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
View ArticleDependencyCheck v3.3.1 - A Software Composition Analysis Utility That Detects...
Dependency-Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies. It does this by determining if there...
View ArticleEKFiddle - A Framework Based On The Fiddler Web Debugger To Study Exploit...
A framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.InstallationDownload and install the latest version of...
View ArticleRaptor WAF v0.5 - Web Application Firewall using DFA
Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal.to run:$ git clone https://github.com/CoolerVoid/raptor_waf$ cd raptor_waf;...
View ArticlePolymorph - A Real-Time Network Packet Manipulation Framework With Support...
Polymorph is a framework written in Python 3 that allows the modification of network packets in real time, providing maximum control to the user over the contents of the packet. This framework is...
View ArticleBlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable
BLACKEYE is an upgrade from original ShellPhish Tool (https://github.com/thelinuxchoice/shellphish) by thelinuxchoice under GNU LICENSE. It is the most complete Phishing Tool, with 32 templates +1...
View ArticleRootstealer - X11 Trick To Inject Commands On Root Terminal
This is simple example of new attack that using X11. Program to detect when linux user opens terminal with root and inject intrusive commands in terminal with X11 lib.Video of Proof of conceptThe...
View ArticleResource-Counter - This Command Line Tool Counts The Number Of Resources In...
This command line tool counts the number of resources in different categories across Amazon regions.This is a simple Python app that will count resources across different regions and display them on...
View ArticleAws_Public_Ips - Fetch All Public IP Addresses Tied To Your AWS Account
aws_public_ips is a tool to fetch all public IP addresses (both IPv4/IPv6) associated with an AWS account.It can be used as a library and as a CLI, and supports the following AWS services (all with...
View ArticlewePWNise - Generates Architecture Independent VBA Code To Be Used In Office...
wePWNise is proof-of-concept Python script which generates VBA code that can be used in Office macros or templates. It was designed with automation and integration in mind, targeting locked down...
View ArticleWAF Buster - Disrupt WAF By Abusing SSL/TLS Ciphers
Disrupt WAF by abusing SSL/TLS CiphersAbout WAF_busterThis tool was created to Analyze the ciphers that are supported by the Web application firewall being used at the web server end. (Reference:...
View ArticleNtlmRelayToEWS - Ntlm Relay Attack To Exchange Web Services
ntlmRelayToEWS is a tool for performing ntlm relay attacks on Exchange Web Services (EWS). It spawns an SMBListener on port 445 and an HTTPListener on port 80, waiting for incoming connection from the...
View ArticleCloudSploit Scans - AWS Security Scanning Checks
CloudSploit scans is an open-source project designed to allow detection of security risks in an AWS account. These scripts are designed to run against an AWS account and return a series of potential...
View ArticleGitMiner v2.0 - Tool For Advanced Mining For Content On Github
Advanced search tool and automation in Github. This tool aims to facilitate research by code or code snippets on github through the site's search page.MOTIVATIONDemonstrates the fragility of trust in...
View ArticlePMapper - A Tool For Quickly Evaluating IAM Permissions In AWS
A project to speed up the process of reviewing an AWS account's IAM configuration.PurposeThe goal of the AWS IAM auth system is to apply and enforce access controls on actions and resources in AWS....
View ArticleEasySSH - The SSH Connection Manager To Make Your Life Easier
A complete, efficient and easy-to-use manager. Create and edit connections, groups, customize the terminal, with multiple instances of the same connection.Developing and BuildingIf you want to hack on...
View Article