Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kali Linux 2018.3 Release - Penetration Testing and Ethical Hacking Linux...

Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes,...

View Article


Image may be NSFW.
Clik here to view.

Vim.Wasm - Vim Editor Ported To WebAssembly

This project is an experimental fork of Vim editor by @rhysd to compile it into WebAssembly using emscripten and binaryen.Try it with your browserNOTICESPlease access from a desktop browser...

View Article


Image may be NSFW.
Clik here to view.

CMSeeK v1.0.9 - CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...

What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...

View Article

Image may be NSFW.
Clik here to view.

Mallet - A Framework For Creating Proxies

Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just more generic.It is built upon the Netty framework, and relies heavily...

View Article

Image may be NSFW.
Clik here to view.

SharpShooter - Payload Generation Framework

SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS,...

View Article


Image may be NSFW.
Clik here to view.

ASWCrypter - An Bash&Python Script For Generating Payloads that Bypasses All...

An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD].PLEASE DON'T UPLOAD BACKDOOT TO WWW.VIRUSTOTAL.COMImportantThis Version Just for test , In future I will...

View Article

Image may be NSFW.
Clik here to view.

Lynis 2.6.8 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article

Image may be NSFW.
Clik here to view.

Crypton - Library Consisting Of Explanation And Implementation Of All The...

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and...

View Article


Image may be NSFW.
Clik here to view.

Syhunt Community Hybrid Scanner v6.2

Syhunt Community is a hybrid static and dynamic web application security scanner. Syhunt is able to scan any kind of application source code for potential security vulnerabilities, pinpointing the...

View Article


Image may be NSFW.
Clik here to view.

Microctfs - Small CTF Challenges Running On Docker

Small CTF challenges running on DockerlogviewerBuild and Start logviewer challenge exposed on port 8000cd logviewerdocker build -t logviewer . docker run -d -p 8000:80 --name log_challenge...

View Article

Image may be NSFW.
Clik here to view.

Apache Struts v3 - Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts

Script contains the fusion of 3 RCE vulnerabilities on ApacheStruts, it also has the ability to create server shells.SHELLphpfinishedjspprocessCVE ADDCVE-2013-2251'action:', 'redirect:' and...

View Article

Image may be NSFW.
Clik here to view.

BillCipher - Information Gathering Tool For A Website Or IP Address

Information Gathering tool for a Website or IP address, use some ideas from Devploit. BillCipher can work in any operating system if they have and support Python 2, Python 3, and Ruby.FeaturesDNS...

View Article

Image may be NSFW.
Clik here to view.

Ducky-Exploit - Arduino Rubber Ducky Framework

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky.This script has been tested onKali Linux 18.2Ubuntu 18.04WindowsWorks with both Python2 and Python3InstallationUbuntu...

View Article


Image may be NSFW.
Clik here to view.

SQLMap v1.2.8 - Automatic SQL Injection And Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...

View Article

Image may be NSFW.
Clik here to view.

badKarma - Advanced Network Reconnaissance Toolkit

badKarma is a python3 GTK+ network infrastructure penetration testing toolkit.badKarma aim to help the tester in all the penetration testing phases (information gathering, vulnerability...

View Article


Image may be NSFW.
Clik here to view.

Telewreck - A Burp Extension To Detect And Exploit Versions Of Telerik Web UI...

A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. This extension is based on the original exploit tool written by Paul Taylor (@bao7uo) which is available...

View Article

Image may be NSFW.
Clik here to view.

KismetMobileDashboard - Mobile UI For Kismet

Prerequisite: git-master level kismet. (https://github.com/kismetwireless/kismet)1.Installation.git clone into the kismet git. ("/home/[whatever]/kismet") wiPi@YoMama:~/kismet# cd ~/kismet...

View Article


Image may be NSFW.
Clik here to view.

Cangibrina v0.8.7 - A Fast And Powerfull Dashboard (Admin) Finder

Dashboard FinderCangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txtRequirements:Python...

View Article

Image may be NSFW.
Clik here to view.

Darling - Darwin/macOS Emulation Layer For Linux

Darling is a runtime environment for OS X applications.Please note that no GUI applications are supported at the moment.DownloadDarling uses many Git submodules, so a plain clone will not do.git clone...

View Article

Image may be NSFW.
Clik here to view.

Rosenbridge - Hardware Backdoors In Some X86 CPUs

project:rosenbridge reveals a hardware backdoor in some desktop, laptop, and embedded x86 processors.The backdoor allows ring 3 (userland) code to circumvent processor protections to freely read and...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>