WPScan v3.3.1 - Black Box WordPress Vulnerability Scanner
WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.INSTALLPrerequisites:Ruby...
View ArticleBetterCap v2.10 - The Swiss Army Knife For 802.11, BLE And Ethernet Networks...
bettercap is the Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and attacks.How to InstallA precompiled version is available for each release, alternatively you can use the...
View ArticleCT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching...
Discover sub-domains by searching through Certificate Transparency logs.What is CT?Certificate Transparency (CT) is an experimental IETF standard. The goal of it was to allow the public to audit which...
View ArticlePatrOwl - Open Source, Free And Scalable Security Operations Orchestration...
PatrOwl is a scalable, free and open-source solution for orchestrating Security Operations.PatrowlManager is the Front-end application for managing the assets, reviewing risks on real-time,...
View ArticleWinSpy - A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener
WinSpy: WindowsReverse Shell Backdoor Creator With ip poisener.Dependencies1 - metasploit-framework2 - xterm3 - apache24 - whiptailInstallationsudo apt-get install gitgit clone...
View ArticleBashark - Bash Post Exploitation Toolkit
Bashark aids pentesters and security researchers during the post-exploitation phase of security audits.UsageTo launch Bashark on compromised host, simply source the bashark.sh script from terminal: $...
View ArticleTLS-Scanner - The TLS-Scanner Module From TLS-Attacker
TLS-Scanner is a tool created by the Chair for Network and Data Security from the Ruhr-University Bochum to assist pentesters and security researchers in the evaluation of TLS Server...
View ArticleTwitter-Intelligence - Twitter Intelligence OSINT Project Performs Tracking...
A project written in Python to twitter tracking and analysis without using Twitter API.PrerequisitesThis project is a Python 3.x application.The package dependencies are in the file requirements.txt....
View ArticleShellcode-Encrypter-Decrypter - Shellcode Encrypter & Decrypter By Using XOR...
A Shellcode Encrypter & Decrypter, Using XOR Cipher to enc and dec shellcode.Installationgit clone https://github.com/blacknbunny/Shellcode-Encrypter-Decrypter.git && python enc.py...
View ArticleTelebix - An Application That Communicates With A Bot On The Telegram To...
Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure monitored by Zabbix, which also sends messages in real time if any...
View ArticleHttplab - Inspect HTTP Requests And Forge Responses
The interactive web server.HTTPLabs let you inspect HTTP requests and forge responses.InstallGolanggo get github.com/gchaincl/httplabgo install github.com/gchaincl/httplab/cmd/httplabArchlinuxyaourt...
View ArticleSlither - Static Analyzer For Solidity
Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write...
View Articletestssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.Key featuresClear output: you can...
View ArticlePython-Nubia - A Command-Line And Interactive Shell Framework
Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell (aka. ldshell)” at Facebook. Since then it was...
View ArticleXSStrike v3.0 - Most Advanced XSS Detection Suite
Why XSStrike?Every XSS scanner out there has a list of payloads, they inject the payloads and if the payload is reflected into the webpage, it is declared vulnerable but that's just stupid. XSStrike on...
View ArticlePasteJacker - Add PasteJacking To Web-Delivery Attacks
The main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this attack in one place and one automated job as...
View ArticleFaraday v3.2 - Collaborative Penetration Test and Vulnerability Management...
Here is a list of all the goodies in Faraday v3.2:Workspace names- with numbers!With this new version, workspaces’ names are now allowed to start with numbers (before they could only start with...
View ArticleJQShell - A Weaponized Version Of CVE-2018-9206 (Unauthenticated arbitrary...
JQShellA weaponized version of CVE-2018-9206 (Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0).DisclaimerUsing this agianst servers you dont control, is...
View ArticleLynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleKillShot - Information Gathering Tool
A Penetration Testing Framework, Information gathering tool & Website Vulnerability ScannerWhy KillShot ?You Can use this tool to Spider your website and get important information and gather...
View Article