Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cheat Engine - A Development Environment Focused On Modding

Cheat Engine is an open source tool designed to help you with modifying single player games running under window so you can make them harder or easier depending on your preference(e.g: Find that 100hp...

View Article


Image may be NSFW.
Clik here to view.

OSFClone - Open Source Utility To Create And Clone Forensic Disk Images

OSFClone is a free, self-booting solution which enables you to create or clone exact raw disk images quickly and independent of the installed operating system. In addition to raw disk images, OSFClone...

View Article


Image may be NSFW.
Clik here to view.

PHP Security Check List

PHP: Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML. The PHP development, which was first created by...

View Article

Image may be NSFW.
Clik here to view.

HexRaysCodeXplorer - Hex-Rays Decompiler Plugin For Better Code Navigation

The Hex-Rays Decompiler plugin for better code navigation in RE process. CodeXplorer automates code REconstruction of C++ applications or modern malware like Stuxnet, Flame, Equation, Animal Farm...

View Article

Image may be NSFW.
Clik here to view.

Iptables Essentials - Common Firewall Rules And Commands

Tools to help you configure Iptables  Shorewall - advanced gateway/firewall configuration tool for GNU/Linux.  Firewalld - provides a dynamically managed firewall.  UFW - default firewall configuration...

View Article


Image may be NSFW.
Clik here to view.

Reko - A General Purpose Binary Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU General Public License.The project consists of front...

View Article

Image may be NSFW.
Clik here to view.

Command Injection Payload List

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application...

View Article

Image may be NSFW.
Clik here to view.

SALT - SLUB ALlocator Tracer For The Linux Kernel

Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit, to debug your own kernel code, and, more importantly, to play with the kernel heap...

View Article


Image may be NSFW.
Clik here to view.

Metasploit Cheat Sheet

The Metasploit Project is a computer security project that provides information on vulnerabilities, helping in the development of penetration tests and IDS signatures.Metasploit is a popular tool used...

View Article


Image may be NSFW.
Clik here to view.

Ophcrack - A Windows Password Cracker Based On Rainbow Tables

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User...

View Article

Image may be NSFW.
Clik here to view.

HT-WPS Breaker - High Touch WPS Breaker

High Touch WPS Breaker [HT-WB] is a small tool based on the bash script language, it can help you to extract the WPS pin of many vulnerable routers and get the password, in the last you want to notice...

View Article

Image may be NSFW.
Clik here to view.

Ntopng - Web-based Traffic And Security Network Traffic Monitoring

ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap and it has been written in a portable way in order to...

View Article

Image may be NSFW.
Clik here to view.

Angr - A Powerful And User-Friendly Binary Analysis Platform

angr is a platform-agnostic binary analysis framework. It is brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish,...

View Article


Image may be NSFW.
Clik here to view.

VSHG - Hardware resistance & enhanced security for GnuPG

VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetricencryption .About VSHGVSHG ( Very secure hash...

View Article

Image may be NSFW.
Clik here to view.

Imago Forensics - Imago Is A Python Tool That Extract Digital Evidences From...

Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If you need to extract digital evidences and you have a...

View Article


Image may be NSFW.
Clik here to view.

Strelka - Scanning Files At Scale With Python And ZeroMQ

Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see:...

View Article

Image may be NSFW.
Clik here to view.

Phantom Evasion - Python AV Evasion Tool Capable To Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64...

View Article


Image may be NSFW.
Clik here to view.

Faraday v3.6 - Collaborative Penetration Test and Vulnerability Management...

Here are the main new features and improvements in Faraday v3.6:Welcome Service NowA new way to send vulnerabilities is available! We integrated Faraday with Service Now, giving you more options to...

View Article

Image may be NSFW.
Clik here to view.

CMSeeK v1.1.1 - CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...

What is a CMS?A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples...

View Article

Image may be NSFW.
Clik here to view.

Rpi-Hunter - Automate Discovering And Dropping Payloads On LAN Raspberry Pi's...

Automate discovering and dropping payloads on LAN Raspberry Pi's via ssh.rpi-hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...

View Article
Browsing all 5816 articles
Browse latest View live