ISeeYou - Bash And Javascript Tool To Find The Exact Location Of The Users...
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary...
View ArticleCHAOS Framework v2.0 - Generate Payloads And Control Remote Windows Systems
CHAOS is a PoC that allow generate payloads and control remote operating systems.FeaturesFeatureWindowsMacLinuxReverse ShellXXXDownload FileXXXUpload FileXXXScreenshotXXXKeyloggerXPersistenceXOpen...
View ArticleDarksplitz - Exploit Framework
This tools is continued from Nefix, DirsPy and Xmasspy project.InstallationWill work fine in the debian shade operating system, like Backbox, Ubuntu or Kali linux.$ git clone...
View ArticlePowerShellArsenal - A PowerShell Module Dedicated To Reverse Engineering
PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble managed and unmanaged code, perform .NET malware analysis, analyze/scrape memory, parse...
View ArticleFaraday v3.7 - Collaborative Penetration Test and Vulnerability Management...
Here are the main new features and improvements in Faraday v3.7: Now, you can include images to explain vulnerability steps, add tables, codes, and we also support:TitleBold and italic typographyClick...
View ArticlePyrit - The Famous WPA Precomputed Cracker
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power of Multi-Core CPUs and other platforms through...
View ArticleXanXSS - A Simple XSS Finding Tool
XanXSS is a reflected XSS searching tool (DOM coming soon) that creates payloads based from templates. Unlike other XSS scanners that just run through a list of payloads. XanXSS tries to make the...
View ArticlePocsuite3 - An Open-Sourced Remote Vulnerability Testing Framework
pocsuite3 is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team. It comes with a powerful proof-of-concept engine, many powerful...
View ArticleISF - Industrial Control System Exploitation Framework
ISF(Industrial Exploitation Framework) is a exploitation framework based on Python, it's similar to metasploit framework.ISF is based on open source project routersploit.Read this in other languages:...
View ArticleBeagle - An Incident Response And Digital Forensics Tool Which Transforms...
Beagle is an incident response and digital forensics tool which transforms data sources and logs into graphs. Supported data sources include FireEye HX Triages, Windows EVTX files, SysMon logs and Raw...
View ArticleFree Cynet Threat Assessment for Mid-sized and Large Organizations
If you cannot see what’s happening in your network, your ability to make smart security decisions will suffer. Many vendors offer threat assessment options, but they usually require an investment of...
View ArticleDefectDojo v1.5.4 - Application Vulnerability Correlation And Security...
DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans,...
View ArticlemXtract v1.2 - Memory Extractor & Analyzer
mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing tool, its primary purpose is to scan memory for private keys, ips, and...
View ArticleMysql-Magic - Dump Mysql Client Password From Memory
The mysql client read the password, then write this for some malloc'ed memory, and free it, but just because a chunk was freed doesn't mean it will be used again, to ensure that your programs not keep...
View ArticleZeebsploit - Web Scanner / Exploitation / Information Gathering
zeebsploit is a tool for hackingsearching for web information andscanning vulnerabilities of a webInstallation & Usageapt-get install gitgit clone https://github.com/jaxBCD/Zeebsploit.gitcd...
View ArticleQRLJacker v2.0 - QRLJacking Exploitation Framework
QRLJacker is a highly customizable exploitation framework to demonstrate "QRLJacking Attack Vector" to show how it is easy to hijack services that depend on the QR Code as an authentication and login...
View ArticleChkdfront - Check Domain Fronting
chkdfront checks if your domain fronting is working by testing the targeted domain (fronted domain) against your domain front domain.FeaturesChecking your domain fronted against the domain...
View ArticleXSStrike v3.1.4 - Most Advanced XSS Detection Suite
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.Instead of...
View ArticleGodOfWar - Malicious Java WAR Builder With Built-In Payloads
A command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby.FeaturesPreexisting payloads. (try...
View ArticleCredsLeaker v3 - Tool to Display A Powershell Credentials Box
This script used to display a powershellcredentials box asked the user for credentials.However, That was highly noticeable. Now it's time to utilize Windows Security popup!As before, The box cannot be...
View Article