Kali Linux 2018.3 Release - Penetration Testing and Ethical Hacking Linux...
Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes,...
View ArticleVim.Wasm - Vim Editor Ported To WebAssembly
This project is an experimental fork of Vim editor by @rhysd to compile it into WebAssembly using emscripten and binaryen.Try it with your browserNOTICESPlease access from a desktop browser...
View ArticleCMSeeK v1.0.9 - CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...
What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...
View ArticleMallet - A Framework For Creating Proxies
Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just more generic.It is built upon the Netty framework, and relies heavily...
View ArticleSharpShooter - Payload Generation Framework
SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS,...
View ArticleASWCrypter - An Bash&Python Script For Generating Payloads that Bypasses All...
An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD].PLEASE DON'T UPLOAD BACKDOOT TO WWW.VIRUSTOTAL.COMImportantThis Version Just for test , In future I will...
View ArticleLynis 2.6.8 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleCrypton - Library Consisting Of Explanation And Implementation Of All The...
Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and...
View ArticleSyhunt Community Hybrid Scanner v6.2
Syhunt Community is a hybrid static and dynamic web application security scanner. Syhunt is able to scan any kind of application source code for potential security vulnerabilities, pinpointing the...
View ArticleMicroctfs - Small CTF Challenges Running On Docker
Small CTF challenges running on DockerlogviewerBuild and Start logviewer challenge exposed on port 8000cd logviewerdocker build -t logviewer . docker run -d -p 8000:80 --name log_challenge...
View ArticleApache Struts v3 - Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts
Script contains the fusion of 3 RCE vulnerabilities on ApacheStruts, it also has the ability to create server shells.SHELLphpfinishedjspprocessCVE ADDCVE-2013-2251'action:', 'redirect:' and...
View ArticleBillCipher - Information Gathering Tool For A Website Or IP Address
Information Gathering tool for a Website or IP address, use some ideas from Devploit. BillCipher can work in any operating system if they have and support Python 2, Python 3, and Ruby.FeaturesDNS...
View ArticleDucky-Exploit - Arduino Rubber Ducky Framework
Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky.This script has been tested onKali Linux 18.2Ubuntu 18.04WindowsWorks with both Python2 and Python3InstallationUbuntu...
View ArticleSQLMap v1.2.8 - Automatic SQL Injection And Database Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticlebadKarma - Advanced Network Reconnaissance Toolkit
badKarma is a python3 GTK+ network infrastructure penetration testing toolkit.badKarma aim to help the tester in all the penetration testing phases (information gathering, vulnerability...
View ArticleTelewreck - A Burp Extension To Detect And Exploit Versions Of Telerik Web UI...
A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. This extension is based on the original exploit tool written by Paul Taylor (@bao7uo) which is available...
View ArticleKismetMobileDashboard - Mobile UI For Kismet
Prerequisite: git-master level kismet. (https://github.com/kismetwireless/kismet)1.Installation.git clone into the kismet git. ("/home/[whatever]/kismet") wiPi@YoMama:~/kismet# cd ~/kismet...
View ArticleCangibrina v0.8.7 - A Fast And Powerfull Dashboard (Admin) Finder
Dashboard FinderCangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txtRequirements:Python...
View ArticleDarling - Darwin/macOS Emulation Layer For Linux
Darling is a runtime environment for OS X applications.Please note that no GUI applications are supported at the moment.DownloadDarling uses many Git submodules, so a plain clone will not do.git clone...
View ArticleRosenbridge - Hardware Backdoors In Some X86 CPUs
project:rosenbridge reveals a hardware backdoor in some desktop, laptop, and embedded x86 processors.The backdoor allows ring 3 (userland) code to circumvent processor protections to freely read and...
View Article