DarkSpiritz v2.0 - A Penetration Testing Framework For Linux, MacOS, And...
A penetration testing framework for Linux and Windows systems.What is DarkSpiritz?Created by the SynTel Team it was a project of one of the owners to update and clean-up an older pentesting framework...
View ArticleKali Linux 2018.4 Release - Penetration Testing and Ethical Hacking Linux...
Welcome to our fourth and final release of 2018, Kali Linux 2018.4, which is available for immediate download. This release brings kernel up to version 4.18.10, fixes numerous bugs, includes many...
View ArticleSharpSploitConsole - Console Application Designed To Interact With SharpSploit
Console Application designed to interact with SharpSploit released by @cobbr_ioSharpSploit is a tool written by @cobbr_io that combines many techniques/C# code from the infosec community and combines...
View ArticleBFuzz - Fuzzing Browsers (Chrome & Firefox)
BFuzz is an input based fuzzer tool which take .html as an input, open's up your browser with a new instance and pass multiple testcases generated by domato which is present in recurve folder of BFuzz,...
View ArticleFrida-Extract - Frida.re Based RunPE (And MapViewOfSection) Extraction Tool
FridaExtract is a Frida.re based RunPE extraction tool. RunPE type injection is a common technique used by malware to hide code within another process. It also happens to be the final stage in a lot of...
View ArticleFrida-Wshook - Script Analysis Tool Based On Frida.re
frida-wshook is an analysis and instrumentation tool which uses frida.re to hook common functions often used by malicious script files which are run using WScript/CScript.The tool intercepts Windows...
View ArticleADModule - Microsoft Signed ActiveDirectory PowerShell Module
Microsoft signed DLL for the ActiveDirectory PowerShell moduleJust a backup for the Microsoft's ActiveDirectory PowerShell module from Server 2016 with RSAT and module installed. The DLL is usually...
View ArticleFindYara - IDA Python Plugin To Scan Binary With Yara Rules
Use this IDA python plugin to scan your binary with yara rules. All the yara rule matches will be listed with their offset so you can quickly hop to them!All credit for this plugin and the code goes to...
View ArticleBlobRunner - Quickly Debug Shellcode Extracted During Malware Analysis
BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis.BlobRunner allocates memory for the target file and jumps to the base (or offset) of the allocated memory. This...
View ArticleIsip - Interactive Sip Toolkit For Packet Manipulations, Sniffing, Man In The...
Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.VideoSetupgit clone https://github.com/halitalptekin/isip.gitcd isippip install...
View ArticleSniffAir - A Framework For Wireless Pentesting
SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care...
View ArticleParrot Security 4.3 - Security GNU/Linux Distribution Designed with Cloud...
Parrot 4.3 is now available for download. This release provides security and stability updates and is the starting point for the plan to develop an LTS edition of Parrot.Linux 4.18Linux was updated to...
View ArticleRobber - Robber Is Open Source Tool For Finding Executables Prone To DLL...
Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies.What is DLL hijacking ?!Windows has a search path for DLLs in its underlying architecture. If you can...
View ArticleScannerl - The Modular Distributed Fingerprinting Engine
Scannerl is a modular distributedfingerprinting engine implemented by Kudelski Security. Scannerl can fingerprint thousands of targets on a single host, but can just as easily be distributed across...
View ArticleArmor - Tool Designed To Create Encrypted macOS Payloads Capable Of Evading...
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners. Below is an example gif of Armor being used with a simple Netcat payload.A Netcat...
View ArticleSQLMap v1.2.11 - Automatic SQL Injection And Database Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleAES-Killer v3.0 - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps...
Burpsuite Plugin to decrypt AES Encrypted traffic on the fly.RequirementsBurpsuiteJavaTested onBurpsuite 1.7.36Windows 10xubuntu 18.04Kali Linux 2018What it doesThe IProxyListener decrypt requests and...
View ArticleDocker-Inurlbr - Advanced Search In Search Engines, Enables Analysis Provided...
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.How to buildgit...
View ArticleSMWYG-Show-Me-What-You-Got - Tool To Search 1.4 Billion Clear Text...
This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation...
View ArticleInvisi-Shell - Hide Your Powershell Script In Plain Sight (Bypass All...
Hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging, Transcription, AMSI) by hooking .Net assemblies. The hook is...
View Article